CodePudding user response:
Didn't know it...CodePudding user response:
Hackers have profound knowledge, so it is difficult to find an introduction to this book,For example, for many people to learn C language, is hard enough, but if the hacker, so not only to learn C language, but also understand the C language of some defects or inadequate, in order to implement such as cache loophole, integer overflow vulnerability,
Therefore, the hacker's primer first is the foundation of computer knowledge,
CodePudding user response:
As far as I know, mainly divides into the web and binaryBinary entry at least half a year, to learn is more popular, after can reverse all kinds of software, decoding software, making plugins, overflow by application software methods such as invasion of others computer, rights and recommended security "zero day", "hole war"
Web portal is fast, it is invaded by means of attack web application server, then still have to depend on power to completely control server, recommended "white hat about web security" is a book that I forgot to call what, black, and very thick a book
Overall: hackers to learn web, binary, network penetration, social worker, cryptography, network protocol, such as a large number of knowledge, not only that, but still have to read Java, c, PHP language, such as python language proficiency, will have to write a script, far more than the average programmers to learn, really, very bitter,
CodePudding user response:
Penetration invasion of the web easierCodePudding user response:
Give you a book links:http://download.csdn.net/download/qq_31672775/10007916
CodePudding user response:
You look at the bookhttp://download.csdn.net/download/u011583120/10107937
CodePudding user response:
Can learn the kali LinuxCodePudding user response:
"Metasploit penetration test" Yellow Book, a virtual machine, a total of five, you can go to kali community search inside this book includes all the basic knowledge of infiltration, all of the test software to be used inside the virtual machine, need to go to the next, the book, the main is to experience what is penetration testing, hope useful to you,CodePudding user response:
Look at the requirement of the building Lord, quick start, metasploit for it,CodePudding user response:
You want to learn the hacker, you must first learn to programming, at the very least, you have to be a kind of language, if you want to do is break, suggest you learn C and assembly at the very least, if you want to do hackers, look at your direction, if is the network, to learn web design or web programming, if involves database, that still have to learn a variety of good data language, programming language finally compiled into executable file, basic is the same code, and database are different, because you don't know will meet what kind of database, all want to learn more, maybe some hackers intelligent, don't learn, real hackers must have their own things, that is to say what you want to achieve, letter hand to do a what kind of procedure to implement, not search on the net, use something else, others some things to yourself doesn't fit,CodePudding user response:
Recommend "white hat about Web security" and "trapped" of the Web (if need be, I have the electronic version can be provided),In addition to the penetration testing, leak testing and defense, the content of the need to know some basic content, including HTML pages, JS. The network of various protocols; Script,
Theory knowledge or need to have the actual environmental test (but not sabotage in someone else's web site), the Internet also has a lot of shooting range environment open virtual machine, but I tried a few more caton, the virtual machine version is lower, also can choose to suit your own site (can see "college, users reflect the experimental environment is good).
CodePudding user response:
May I say first two books faster introduction of Web security, in general, want to introduction to this line of security, generally accepted Web safety threshold is low,"White hat about Web security" Wu Hanqing (brother)
"Web front-end hacking Revelations"
"JavaScript Dom programming art"
"Xss cross-site scripting attack analysis and prevention"
"SQL injection attacks and prevent"
Web security depth profiling "
Etc. These books online search a lot of, the key is picked up a book to read, there is always a harvest
Secondly I want to say, not programming will be your best the most headache, so much so that you can only use what others to you, learning, to quote a wrong you do not know how to start, so solid learning and practice to write code to read it
CodePudding user response:
Still learning assembly language to suit youCodePudding user response:
You are still the first computer system research wellCodePudding user response:
To learn the hacker, at least you have to learn a language well to say again, words are referred to as the instance