← Home ← Back to /g/

Thread 106320612

22 posts 6 images /g/
Anonymous No.106320612 >>106320695 >>106321123 >>106322457
Hacking
I want to get into white hat hacking and learning how to hack, I was wondering if anyone knew anywhere I could learn how to, or if anyone would like to share/give suggestions on how they learned or where a good place to learn is. I know 4 chan is kinda famous/infamous for hackers so I thought this would be the best place to go for help in learning
Anonymous No.106320622 >>106320647
btw I'm trans
Anonymous No.106320647 >>106320686 >>106320759
>>106320622
I knew that when you said "white hat", OP.
Anonymous No.106320651
Okay cool but do you what does that have to do with my post
Anonymous No.106320659
The person who said there trans isn't even the op, I'm the op and I'm not trans just want to learn how to hack
Anonymous No.106320686
>>106320647
I'm the op, the person who said their trans is some random person, I am not trans I just want to learn how to hack
Anonymous No.106320695 >>106320758 >>106321139
>>106320612 (OP)
For beginners, probably https://academy.hackthebox.com/ & https://tryhackme.com/
Anonymous No.106320713 >>106320751
So you wanna learn how to hack stuff? Here's a brief guide on that.
1. Learn to code. Coding is the art of writing extremely precise instructions.
2. Learn about computer networks and cybersecurity. Nowadays, most people share their information through the Internet, so it's good to know every part about how this information is sent and received, modulated, demodulated, etc., and then how people try to protect it from attackers or strangers with too much time in their hands.
3. Learn scripting. Scripting can be seen as a useful extension of coding meant to solve specific tasks (such as opening and scanning a set of files, packing and unpacking data, managing partitions of your disk, receiving or halting updates, compiling code into an executable program, etc.)
Once you have learned all that, you will be able to exploit security flaws for the sake of aiding people and organizations in spotting ways of further strengthening their data storage and sharing facilities, and also helping to prevent major break-ins by malicious agents without interrupting service for ordinary users.
Anonymous No.106320734 >>106320770 >>106320784
Op here, I am trans i am not sure why theirs 2 people trying to hijack my thread??
Anonymous No.106320751
>>106320713
>.
Thank you
Anonymous No.106320752
Anonymous No.106320758
>>106320695
Thank you
Anonymous No.106320759
>>106320647
That's racist. Trans is the new black, bigot.
Anonymous No.106320770
>>106320734
Its okay honey, we at /g/ love girlcocks.
Anonymous No.106320784 >>106321034
>>106320734
Why do you feel the need to lie about being the op and feel the need to try and convince people I'm trans? It's a genuine question because it's kinda odd that you want to. That's 4 chan for you tho, it's my first ever post and im trying to gain knowledge and someone wants to troll just cuz
Anonymous No.106321034
>>106320784
Bruv...
Anonymous No.106321123
>>106320612 (OP)
first, you need to learn how to make a 7" dildo disappear in your ass starting from the tip, and gradually working your way up to the base.
Anonymous No.106321139 >>106321173
>>106320695
thanks for the malware
Anonymous No.106321173 >>106321348
>>106321139
You failed the assessment retard.
Anonymous No.106321348 >>106321386
>>106321173
You did
Anonymous No.106321386
>>106321348
No you
Anonymous No.106322457
>>106320612 (OP)
You first need to learn C vecause most of your attack surface will be C as every OS is built on it. If you feel like it's not too much for start learn x86 assembly. Also you should learn python because you will write concepts fast. Then learn how operating systems you plan to exploit work. For a begginner you probably use windows. Install arch or gentoo, and crosscompile something simple like a keylogger or modify some remote shell that you can use to play with your victims. When you get a hang of it, start reverse engineering games, some games today have very annoying anti tampering techniques, but they are just obfuscations for the most part. Just don't five up if you're passionate anon. Don't install kali loonix, just use arch like us all.