[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vr / w / wg] [i / ic] [r9k] [s4s ] [cm / hm / lgbt / y] [3 / adv / an / asp / cgl / ck / co / diy / fa / fit / gd / hc / int / jp / lit / mlp / mu / n / out / po / pol / sci / soc / sp / tg / toy / trv / tv / vp / wsg / x] [rs ] [status / sb / @] /b/ - Random The stori es and i nformati on posted here are arti sti c works of fi cti on and fal sehood. Onl y a fool woul d take anythi ng posted here as fact. Posting mode: Reply [Return] [Catalog] [Bottom] [Update] [ Auto] E-mail Submit Comment Verification 4chan Pass users can bypass this CAPTCHA. [Learn More] [Login] File No se ha seleccionado ningn archivo Seleccionar archivo Password (Password used f or deletion) Supported fi l e types are: GIF, JPG, PNG Maxi mum fi l e si ze al l owed i s 2048 KB. Images greater than 250x250 pi xel s wi l l be thumbnai l ed. Read the rul es and FAQ before posti ng. - Important news post that covers moderation, board culture, and shitposting, as well as a handful of changes. I think this is the second longest news post ever, so it's probably worth reading if you're an active user (and if you want to be put to sleep by my writing). Our "4chan: The Official 10th Anniversary Panel" is taking place at Anime Weekend Atlanta 2013 *this coming* Saturday, September 28th at 10:00PM ET. If you're attending the con, we hope you'll join us. Otherwise, you'll be able to tune-in via livestream. Subscribe to our YouTube channel to be notified when the stream goes live. File: 1380005055389.jpg-(55 KB, 514x645, art of exploitation.jpg) Type the text (Required) Edit your settings >> >> >> >> >> >> >> >> Anonymous 09/24/13(Tue)03:44:15 UTC-3 No.507622896 Replies: >>507623015 >>507623294 >>507623450 >>507623512 >>507625272 >>507629298 >>507629665 What are some good books about hacking? I've downloaded Hacking: The Art of Exploitation. Anonymous 09/24/13(Tue)03:45:34 UTC-3 No.507623015 Replies: >>507623105 >>507622896 (OP) Wait you DOWNLOADED a BOOK!? Sounds like you're already quite the hacker! Anonymous 09/24/13(Tue)03:46:32 UTC-3 No.507623105 Replies: >>507623182 >>507623015 this Anonymous 09/24/13(Tue)03:47:21 UTC-3 No.507623182 >>507623105 that Anonymous 09/24/13(Tue)03:48:24 UTC-3 No.507623294 Replies: >>507624870 >>507622896 (OP) The art of deception by kevin mitnick Anonymous 09/24/13(Tue)03:49:58 UTC-3 No.507623450 >>507622896 (OP) Computer Networks (4th Edition) - Andrew S. Tanenbaum Anonymous 09/24/13(Tue)03:50:32 UTC-3 No.507623512 Replies: >>507629057 >>507629654 >>507629859 >>507622896 (OP) Yo mate, you should learn a programming language first. Hacking doesn't just focus on one subject, there are alot of ways to hack and alot of things to hack. You go learn a programming language first and then explore stuff you want to hack (it's more fun that way). Rewritten this reply because captcha fucked up my post. Anonymous 09/24/13(Tue)04:02:42 UTC-3 No.507624870 >>507623294 That one is like belles-lettres. No real recipes. Anonymous 09/24/13(Tue)04:03:46 UTC-3 No.507624970 >> >> >> >> >> >> you just posted this shit on /g/. Fuck off nigger Anonymous 09/24/13(Tue)04:04:36 UTC-3 No.507625058 lol skid Anonymous 09/24/13(Tue)04:06:32 UTC-3 No.507625272 File: 1380006392240.jpg-(27 KB, 330x452, book-white.jpg) >>507622896 (OP) Anonymous 09/24/13(Tue)04:37:40 UTC-3 No.507628775 Replies: >>507629090 hacking is overrated. the term alone is thrown around so much it practically means nothing. idiot: "ermagerd my facebook wuz hacked" me: "no, your password was just compromised." person: "somebody managed to exploit the mysql backend of my server, dropping all my tables." me: "oh noes." >In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Anonymous 09/24/13(Tue)04:40:40 UTC-3 No.507629057 >>507623512 no, don't give him that advice. there are enough script-kiddie wannabe pseudo-hackers. hmm, unless you too are a script-kiddie.... Anonymous 09/24/13(Tue)04:41:02 UTC-3 No.507629090 >>507628775 In real life context, a hacker is someone with ingenuity (usually focused on technology) to solve a problem. ZF0 solved media-whoring by rooting peoples' servers old school programmers built GNU to solve the lack of free operating systems etc etc > preemptively defused hacker vs cracker debate Anonymous 09/24/13(Tue)04:42:58 UTC-3 No.507629298 >>507622896 (OP) Well, you're never going to learn it because you don't have the determination. You might want to >> >> >> [17 replies] [1 image] [Page 0] [Settings ] [Rules ] [FAQ] [Home] Style Yotsuba Delete Post [ File Only] Password Delete Report study telecommunications and network security. And networking in general, otherwise you'll never be a GOOD hacker. You'll only know what you're directly taught. Anonymous 09/24/13(Tue)04:46:42 UTC-3 No.507629654 >>507623512 No, just no. He shouldn't even touch programing untill he even knows what the fuck hes going to code. If he has no basic knowledge of hacking then how is he going to learn anything from a stupid "hello world" tutorial, if anything its just going to teach him how to code useless programs. Anonymous 09/24/13(Tue)04:46:48 UTC-3 No.507629665 >>507622896 (OP) I have 100s of ebooks. I might just upload it. Anonymous 09/24/13(Tue)04:49:11 UTC-3 No.507629859 >>507623512 >Yo mate, you should learn a programming language first. My advice is to learn everything about everything, hackers exploit more than just computer and security systems, you can hack anything, the term really just refers to using a system in ways it was not intended, sometimes that's to bypass security, sometimes it's just to use its function for something else. It means being very well educated, studying the systems you want to "hack" and then using novel and lateral thinking to do something unintended. If you look at any good hacking conference like DefCon the speakers will talk about all kinds of systems, phones, computers, safes, cars, planes, slot machines, ATM machines, routers... All the truly great hackers that discover actual vulnerabilities in systems are usually those who have deep knowledge of just 1 field and study pieces of hardware or software for years until they know the systems better than the people who developed them. [Return] [Catalog] [Top] [Update] [ Auto] [a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vr / w / wg] [i / ic] [r9k] [s4s ] [cm / hm / lgbt / y] [3 / adv / an / asp / cgl / ck / co / diy / fa / fit / gd / hc / int / jp / lit / mlp / mu / n / out / po / pol / sci / soc / sp / tg / toy / trv / tv / vp / wsg / x] [rs ] [status / sb / @] - futaba + yotsuba - Al l trademarks and copyri ghts on thi s page are owned by thei r respecti ve parti es. Images upl oaded are the responsi bi l i ty of the Poster. Comments are owned by the Poster. Edit your settings
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing