Teya Salat
LOVEGRAPHIST.NET
20170618103655

WELCOME TO LOVEGRAPHIST WAP

HOME OF UNLIMITED DOWNLOADS

OUR PAGES
---------
WELCOME BACK YOUR LAST VISIT WAS ON' ARENAS
Facebook Arena
2go Arena
Like our Facebook fanz page
* HOT TUTORIAL (0/0)
LEARN ALL THE JAVA SCRIPT YOU WANT TO LEANR HERE!!!

Online: Guests: 1
OBEY THE REPLY FROM THE SERVER, BECAUSE THE SERVER WILL BE YOUR GUIDE
2GO USERNAME:
Your Username Is:
STAR LEVEL::
Your Current Star Level Is:
BOOSTER TASK::
Task Selected Is:""
SERVER REPLY::Boosting....

HOW TO BECOME AN HACKER BY LOVEGRAPHIST


The steps that need to be taken to become a hacker
are not easy. This article will give you few of the
most important steps . The
article will focus on skills and attitude that is
required to become a hacker. Breaking the security
system and entering into the system is not the only
thing a hacker does. A relentless attitude and
pristine skill-sets are two cornerstones for being a
master hacker.
Knowledge of wide variety of computer science
topics is required, however knowing things at great
depth is the key to a hackers success. Therefore
having a positive attitude toward learning is essential
in the .
Below is the I have created to
teach you how to be a hacker:
I recommend this free
essential to be a hacker
journey of learning to become a hacker
step by step guide
Step 0: Read The Hacking Manifesto
It is not an easy task to be a hacker. As a hacker, you
need to have an attitude and curiosity. Reading
can teach you the attitude of a
hacker. Nurturing the hacker attitude is more about
developing competence in the languages rather than
having a stereotypical attitude.
Though a lot of people consider that a hacker is a
criminal; However in real life, they are hired by big
companies for protecting information and minimizing
potential damage. The act of hacking actually is that
of being over-curious and outwitting authority. As a
hacker, you should be hell bent on breaching
authoritarian rules, secrecy and censorship.
Deception is another arsenal which will allow you to
dodge the vigilant eyes of authority.
The act of stealing something or doing harm to
someone . Such people are commonly
called crackers in the community. Crackers are
involved in illegal activities and I will not recommend
you to get involved into such activities.
the
hacking manifesto
is not hacking
Step 1: Learn To Program In C
C programming being one of the most powerful
languages in computer programming, It is necessary
to really master this language. This programming
language was invented by Denise Ritchie in between
the years 1969 and 1973 at AT& T Bell Labs. C
programming will essentially help you divide the task
in smaller pieces and these pieces can be expressed
by a sequence of commands. Try writing some
program on your own by assessing the logic.
There are hundreds of
available on web to learn, however I would
recommend you to start with a simple and well
written of your choice and then
read this book (
By Brian W. Kernighan and Dennis M. Ritchie) to
understand the real power of c language.
This books is not an easy read however its a must
read book to get in depth understanding for C
Programming.
Free C Programming PDF &
tutorials
c programming book
C Programming Language
Step 2: Learn More Than One Programming
Language
When you are trying to become a hacker, it is very
important to learn other modern computer
programming languages such as JAVA, Perl, PHP and
Python. One of the best ways to learn these is by
reading books from experts. It will also help to know
about markup languages like XML, HTML and data
formats such as Json, Protobuf and others which are
common way to transfer data between client and
server.
Java is one of the most popular programming
languages. It has been claimed that its also very
secure. Knowing Java security model will empower
you to understand how this language achieve
security. Learn about the security loop holes in Java
language and related frameworks. Pick and read from
available to
learn java online.
Perl is a general purpose dynamic programming
language, which is high level and can be interpreted.
This language borrows some features of C language.
On the other hand, JAVA is concurrent, class based
and objects oriented programming language. Python
is really handy when you are trying to automate
some repetitive tasks.
HTML is the mark up language based on which the
web pages are designed, created and displayed. The
web browsers read the HTML code to display the
web page.
Python is and
favorite language of a lot of programmer due to its
simplicity and quick turn around. A lot of people use
Python to do simple and complex automation.
For more programming language tutorials check -
.
many free PDF, tutorials and ebooks
best language for web development
best programming tutorials
Step 3: Learn UNIX
UNIX is a multi-tasking and multi-user computer
operating system that is designed to provide good
security to the systems.This operating system was
developed by some employees of AT&T in Bell
Labs.The best way to learn it is to get into an open-
source version (e.g. centos) and install/run the same
on your own. You can operate internet without
learning UNIX, but it is not possible for you to be an
internet hacker without understanding UNIX.
If you have not used Unix operating system yet, a
will make your comfortable
in getting quickly started.
by Arnold Robbins is a good way
to start. This book will teach you how to use Unix.
The next thing you need to know is the internals of
this operating system. I recommend
by Maurice
J. Bach for getting in depth understanding of Unix
operating system.
A large number of web servers are hosted on Unix
based servers and knowing internals of this
operating system is going to be really a big boost in
your skills.
few
essential linux commands
Unix in a Nutshell
The Design of the UNIX Operating System
Step 4: Learn More Than One Operating Systems
There are many other operating systems apart from
UNIX. Windows operating system is one of the most
commonly compromised systems, hence it is good to
learn hacking Microsoft systems, which are closed-
source systems.
According to the National Vulnerability Database,
Microsoft operating systems have a large number of
vulnerabilities.
Windows OS installers are distributed in binary,
therefore it is not easy for you to read the code.
Binary code is basically the digital representation of
text and data that computer understands. However,
knowing and
how different applications behave on this operating
system will help.
One of the recent vulnerabilities of a popular OS was
that Java Web Start applications get launched
automatically even if the Java plug-ins are disabled.
How to be a hacker is about knowing the weaknesses
of these operating systems and targeting them
systematically.
how programs are written for windows
Step 5: Learn Networking Concepts
The networking concept needs to be sharp when you
want to be a hacker.
Understanding how the networks are created is
important, however you need to know the differences
between different types are networks. Having a clear
understanding of TCP/IP and UDP protocol is a must
to be able to exploit the vulnerabilities on world
wide web.
Understand what is subnet, LAN, WAN and VPN.
I recommend Computer Networking:
By James F. Kurose and Keith W. Ross
The networking commands to do a HTTP request
needs to be on your fingertips. The HTTP protocol, is
the gateway through which one enters the internet
world. Hence it is necessary to learn this protocol in
order to break the barriers. The hackers often use the
HTTP gateway to breach the security of the system
and take control over it.
is one of the most commonly used web
servers and knowing in and out of it is going to
empower you on any HTTP or other application layer
protocol related endeavors.
Nmap is a powerful network scanning tool that is
used by hackers and security professional across the
world to identify vulnerable hosts. However, to
effectively start using it you must understand the
networking basics. To get advanced skills on NMap
you can refer the book by creators - Nmap Network
Scanning: to
Network Discovery and Security Scanning
A Top-Down
Approach
Apache Httpd
The Official Nmap Project Guide
Step 6: Start Simple: Read Some Tutorials About
Hacking
This is the simple and best way to start. Read as
many tutorials as possible that are meant for
hacking. These articles will give you insight and help
you develop the attitude to be a hacker. Some
tutorials will initiate you with Nmap, Nessus and
SuperScan, some of the hacking programs or tools
that hackers generally use. These tutorials are readily
available over the internet; Both
are available for you to answer your
question how to be a hacker.
text and video
tutorials
Step 7: Learn Cryptography
As an expert hacker, you need to understand and
master the art of cryptography. The technology of
cryptography and encryption is very important for
internet and networking. It is the practice and study
of techniques that are used for secure
communication in the presence of third parties. The
encryption is done for various aspects of information
security such as confidentiality of the data, integrity
of the data and authentication. Moreover, the
technology of cryptography is extensively used in
ATM cards, computer passwords and e-commerce.
While hacking, these encrypted codes needs to be
broken, which is called decryption.
Cryptography is heavily used in SSL based internet
communication. An expert hacker should be able to
understand how SSL works and what is the
importance of cryptography in keeping SSL secure.
Try reading about various encryption algorithms and
see why they are difficult to decrypt. Participate in
challenges for decrypting a powerful encryption. An
expert hacker will be able to demonstrate
weaknesses in a encryption algorithm and should be
able to write a program that can show how
decryption can be performed without much
information about keys.
Understand various techniques used for password
cracking. There are dozens of tools available to do
password cracking, and using it is not hacking. To
be expert at hacking its important for you to
understand how to create a program that can crack a
password from cypher text.
Cryptography Course By Dan
Boneh from Stanford University at Coursera
Step 8: Experiment A Lot
This is an important step for setting yourself up as
an expert hacker. Setup a laboratory on your own to
experiment the learning on the practical applications.
A simplest lab will have your computer, however
once you advance you may want to add more and
more computers and required hardware for your
experiments.
It is good to try experimenting on your own
computers, where you can rectify if you have done
any mistake. Many hackers initially start off by
downloading virtual lab applications such as Oracle
VirtualBox. You require at least 3 GBs of RAM and a
comparatively powerful processor to carry out your
hacking experiments. Setting up the virtual machine
is crucial, as it will allow you to test virus,
applications and different servers without affecting
your own PC.
Some of the things you may need to keep in mind
when doing experiments
Keep a backup before any experiment.
Start small and have check points.
Know when to stop.
Document your progress
Keep improvising
Automate repetitive tasks
Step 9: Read Some Good Books From Experts
Reading will always enhance your knowledge. Try to
read as many books and articles as possible
Reading a lot about anything related is so important
in a hackers world that you must also consider
enhancing your reading speed. If your reading speed
is slow then you may not be able to progress fast in
this field. Practice speed reading techniques like
skimming, chunk reading etc.
When it comes to reading a lot, its also important to
know that a majority of content on web is not worth
your time. Many people use search engine tricks to
attract traffic but have little value in it. If you skim
thru an article within seconds and decide not to read
that is going to save you a lot of time for some really
well researched content.
by Jon Erickson is an
excellent book to teach you become an advanced
hacker.
written
by the experts in the field field of ethical hacking and
enterprise security
The Art of Exploitation
Step 10: Participate In Hacking Challenges
Regular participation in the hacking challenges can
help you learn more and sharpen your knowledge.
There are several companies that organize these
challenges in order to check the vulnerability of their
software products. The most common hacking
challenge includes breaching the security system of
the software and taking control of the third party
computer systems. Apart from that, there are some
websites listed below that regularly offer hacking
challenges online.
hackquest.de
hacktissite.org
www.trythis0ne.com
www.hackchallenge.net
hacking-lab.com
Step 11: Go Next Level: Write Vulnerability
Vulnerability of a program is the weakness of the
program. It is a good approach to look for the
vulnerability of an existing program and share the
same with others. In this way you will have the
option to collect varied opinions from different
sources, enabling you to hone your current skill set.
The examples of computer vulnerabilities include
memory safety violation, input validation error,
privilege confusion bugs and user interface failure.
For instance, Microsoft’s Internet Explorer 11 had the
vulnerability bug in its preview version which several
hackers exploited.
Identifying a new weakness in any software is the
real work any expert hackers would perform.
Step 12: Contribute To Open Source Security
Projects
Contributing to an open-source computer security
project is great platform to test your skills. This is
not everyone’s cup of tea. Many organizations like
Mozilla and Apache offer these types of open source
projects. Try to be a part of these projects and add a
valuable contribution to the benefit of the
community.
Participating in the open source security projects
such as anti-spam, anti-virus, firewall and data
removals help you augment your dexterity as a
hacker.
Contribute your vulnerability findings to the global
vulnerability databases and give back to the
community.
Remember that it does not matter if your contribution
is small, as long as you participate and add value it
helps.
Step 13: Continue Learning And Keep Listening To
Security Talks
The key to success in the hacking career is
continuous learning. Reading blogs for hacking
available at sites such as hackerfactor blog and IKEA
hacker blog; participating in the forums such as
hackforums.net and elite hack are great ways to
refresh your knowledge as a hacker. The online video
forums like TED or TechTalk are good sources to
know more about the emergent hacking techniques
and technologies that are being deployed. You
should also try following the posts of famous
hackers such as Adrian Lamo, Kevin Mitnick, Kevin
Poulsen and Robert Tappan Morris.
Summary
Above are few exhaustive steps that can teach you
how to be a hacker and help you walk the road of
being an expert hacker. However, you should be a
responsible citizen and be selective, ensuring you
don’t use this skill to breach the security of
important institutions, as it may land you in dire
straits. You should always remember, for every
hacking tool, there is always a counter hacking tool.
Therefore, be a smart hacker and more importantly,
be a responsible hacker.

WWW.LGWAP.WAPHALL.COM


This site
WWW.lgwap.waphall.com
site owned by : Abdullahi Opeyemi Abdullateef
Copyright ©: 2014
Get ur latest gist and updates here!!!
or visit WWW.seeandpost.blogspot.com
LGWap Welcome once you again

HOME OF UNLIMITED DOWNLOADS