Tips to be a security master or hacker
Results 1 to 5 of 5

Thread: Tips to be a security master or hacker

  1. #1

    Tips to a security master or hacker

    **Contents**
    - Tips to becoming a hacker or Wanting to work with computers and Security
    - Stuff you may want to think about and learn
    - Before learning anything else
    - Should also think about getting some of these on your box (for learning )
    - A few good books to check out
    - computer and Internet Terms (Small list)
    - Links, Links & more Links / Other places to Hang out
    - Tips from the Pro's
    ---------------------------------------------------------------------
    -=-Tips to becoming a hacker or wanting to work with computers and security-=-
    First thing most people will tell you is to use google ( www.google.com ). All ways use google before asking a question, Most the time google will answer your question within a few minutes. Also useing google will save you and me some time & also save space on This site or any site for other people to post questions they did not find on google.

    Also Read as many books as you can. Run to your local bookstore pick up a book look at it and see if you like the info it gives you. Make sertain it's a book you can read and understand. A book for a newbie is perfect if your first starting out. There is always going to be something to learn about computers & Technology Since every day something new comes out and also there is the past to learn about.
    ---------------------------------------------------------------------
    -=-Stuff you may want to think about and learn-=-

    - A programming Languge (C, C++, Perl)
    - TCP/IP
    - Networking
    - Unix based computers (linux, BSD, Solaris,)
    - Learn as much as you can about windows also
    - It might help to learn Social Engineering
    - Just learn how a computer works and runs and the parts inside that make it work

    here is a link to the above stuff I told you to learn. This link may help you learn about the above info http://www.jinx.com/forum/topic.asp?TOPIC_ID=5359 , http://www.comms.scitech.susx.ac.uk/fft/

    Always learn new things and test what you learn with computers it's trial and error. Don't ever give up if you don't get something working the first time.
    --------------------------------------------------------------------
    -=-Before learning anything else:-=-
    1. Learn about hardware - basicly how your computer works.

    2. Learn about different types of software.

    3. Learn your command line.

    4. Learn how to make a few batch files.
    - http://www.tnd.com/camosun/elex130/dosbatchtutor1.html
    - http://www.tnd.com/camosun/elex130/dosbatchtutor2.html

    5. Port scanning. ( download blues port scanner if it's your first time)
    - http://www.securityconfig.com/softwa...t_scanner.html

    6. Learn a few programming/markup languages
    HTML,C/C++,Perl.... (i'd recommend learning Qbasic as your first lang)

    7. How to secure yourself (proxy etc)

    8. FTP and telnet

    9. Your protocols TCP/IP , UDP , SMTP etc

    10. Get your hands dirty with networking
    ---------------------------------------------------------------------
    -=-Should also think about getting some of these on your box (for learning )-=-
    An FTP client.
    - http://www.download.com/Fastream-Net...ml?tag=lst-0-3
    - http://www.download.com/SmartFTP/300...ml?tag=lst-0-1
    - http://www.download.com/AceFTP/3000-...ml?tag=lst-0-5

    A ping utility.
    - http://www.download.com/vPing/3000-2...ml?tag=lst-0-3
    - http://www.download.com/Inspyder-Son...ml?tag=lst-0-9

    An IP scanner (also known as subnet scanner)
    - http://www.download.com/NetworkActiv...ml?tag=lst-0-2

    A port scanner.
    - http://www.download.com/Advanced-Por...ml?tag=lst-0-1
    - http://www.securityconfig.com/softwa...t_scanner.html

    A whois and nslookup utility.
    - http://www.itoolpad.com/
    -
    A traceroute utility.
    - http://www.oxid.it/cain.html
    -
    A password cracker.
    - http://www.oxid.it/cain.html
    -
    A CGI vulnerability scanner
    -
    -
    A Net BIOS share scanner.
    -
    -
    A finger client.
    -
    -
    Compilers.
    - http://www.programmersheaven.com/zone24/cat351/
    -
    Cache rippers.
    -
    -
    A brute force program of some sort.
    - http://www.hoobie.net/brutus/brutus-download.html
    -
    Trojans, rootkits, and RAT's. (just for learning though)
    -
    -
    Sniffers.
    - http://www.oxid.it/cain.html
    -
    * Note * I'll add more links when I have time. *
    ---------------------------------------------------------------------
    -=- A few good books to check out -=-
    We tell you to check out books but we don't give any hints or ideas of what kind of books. Well I'll name a few books thatmay be of help to you.

    - Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition ISBN: 0072227427

    - Google Hacks ISBN: 0596008570

    - Hacking: The Art of Exploitation ISBN: 1593270070

    - The Art of Deception: Controlling the Human Element of Security ISBN: 076454280X

    - Dictionary of computer and Internet Terms (Eighth Edition) ISBN: 0764121669

    - Gray Hat Hacking: The Ethical Hacker's Handbook ISBN: 0072257091

    - Computer Security: Art and Science ISBN: 0201440997

    - Networking in Easy Steps (In Easy Steps Series) ISBN: 0760753628
    ---------------------------------------------------------------------
    -=-computer and Internet Terms (Small list)-=-

    boot disk - A disk, diskette, or CD that can be used to BOOT (start up) a computer

    IP address - A computers unique "address" Every computer has one. This address is the way people that aren't on your computer see you as. Without an IP, websites wouldn't be able to "Remember" you so you don't have to log in everytime. Everyones local ip address is 127.0.0.1. This is how your computer looks at you. But it's not the same as your "Real" IP address which is how everybody else sees you. Quick example of an IP address:
    198.3.45.236
    There are 4 "subnets" and none of these "subnets" can be over 255.

    MAC address - This address is also for your computer. HOWEVER, this address was given to you by your hardware manufacturer. This is NOT the same as your IP address

    Skiddie (Script-Kiddie) - Someone that uses others programs with no intent to use or even try to make his own. Real hackers try and make their own programs and use others for examples or for when theres no point in writing a new one

    Cracker - Someone that cracks computers for malicious reasons. Whether it be black mailing, carding obtained card numbers, or just ****ing someone over.

    sniffer - A hardware device or computer program for intercepting data packets as they pass throught a network either to test the network or to intercept other people's confidential data.

    Trojan horse (Trojan) - a computer program with a hidden destructive function, such as erasing the disks on a specified date. Trojan horses are often distributed as conterfeit "new" versions of shareware products.

    password cracker - is an application program that is used to identify an unknown or forgotten password to a computer or network resources. It can also be used to help a human cracker obtain unauthorized access to resources.

    Compilers - Special programs that take instructions written in a high level language (e.g., Pascal, Fortran) and convert it into machine language or code the computer can understand.
    Also called: Optimizing Compilers

    FTP - ( File Transfer protocol ) a standard way of trasferring files from one computer to another on the Internet and on other TCP/IP networks..

    google - a widely used search engine for the world wide web, accessible at www.google.com and throught links on many other web sites.
    ---------------------------------------------------------------------
    -=Links, Links & more Links=-
    Other Places to Hang out

    - http://www.hackthissite.org/
    Hack this site is a very good War game site and training ground that is legal for hackers today.

    - http://www.binrev.com/
    Binrev has a very nice Radio station with computer info and hacking tips, They also have a nice forum with nice members who love to help and show what they know. And also they have a hacking magazine

    - http://www.2600.com/
    A great Hacking magazine that comes out Quarterly (Price= $5.99)

    - http://www.blacklisted411.com/
    Another Hacking Magazine

    - http://www.astalavista.com/
    A great computer Security Area with lots of info

    - http://www.hackerthreads.org/
    There a hacking forum with lots of members and lots of info

    - http://www.hackaday.com/
    A kind of hacking Blog were they give you links and share info on what they find that day. Updated Daily!

    - http://www.i-hacked.com/
    A good site with forums, Downloads, News, and much much more.

    - http://www.phreaksandgeeks.com/
    The name says it for ya

    - http://www.hnc3k.com/
    Hacking Programs to download, Guides and Tips, and much more.

    - http://www.informationleak.net/

    - http://www.digzine.com/

    - http://www.blackhat.info/live/index....&theme=Printer

    - http://www.jinx.com/

    - http://www.irongeek.com/
    Share on Google+

  2. #2
    Title changed:
    "Tips to be a security master or hacker" not a "Tips to a security master or hacker"
    Share on Google+

  3. #3
    Senior Member
    Join Date
    Oct 2001
    Posts
    748
    So network killer are you the person that originally posted this information here?

    http://www.1-2-free-forums.com/mf/ladystorm-post-5.html

    The direct link was not working for me, so here is the google cache-

    http://64.233.167.104/search?q=cache:AT5L8N-_TpsJ:www.1-2-free-forums.com/mf/ladystorm-post-5.html+%22link+to+the+above+stuff+I+told+you+to+learn%22&hl=en&lr=&strip=1


    It's not really polite to copy other content and not give a source.
    Share on Google+

  4. #4
    Hey,
    This is not a original post, I just posted here to give some basic steps, so that it will be easy to start carrier on network security.
    Got it?
    Share on Google+

  5. #5
    Senior Member
    Join Date
    Jan 2003
    Posts
    3,914
    Originally posted here by Network killer
    Hey,
    This is not a original post, I just posted here to give some basic steps, so that it will be easy to start carrier on network security.
    Got it?
    First... you come off sounding a little rude there.... which you have no right to be....

    Second... and this is a big one... if you think that what you posted will make it easy to start in a career in network security... you've got a few screws loose... or to put it more generally (in a ruder sense that you may understand).. You're a ****ing idiot...

    Have the utilities you mentioned are outdated.. half the things in the "article', if it can be called that, are incorrect... the pathways to learning are useless... needless to say it's nothing more than a shitload of garbage....

    Since you're the big l33t Network Killer, I'm sure you don't need any advice... but in case you want to take it... Grow the **** up... stay away from skiddie **** like you posted and learn a thing or two.

    Peace
    HT
    IT Blog: .:Computer Defense:.
    PnCHd (Pronounced Pinched): Acronym - Point 'n Click Hacked. As in: "That website was pinched" or "The skiddie pinched my computer because I forgot to patch".
    Share on Google+

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •