Ready to Start Your Career?
March 18, 2018
Resources and Career Information for Hackers
March 18, 2018
Breakthroughs There are too many breakthroughs, but we can limit them to several key concepts:1 - penetrate sites and servers and forums. 2. LAN penetration. 3 - hacking personal computers.First: hacking sites and servers and forums If we want to expand in this concept of breakthroughs, we find that it is divided into three types of penetration: hacking sites in general, hacking servers, hacking forums of all kinds. But I will explain the mechanism and principle of penetrating sites in general. It is known that all sites are based on the programming languages of the network and the Internet and the Internet. Of these languages PHP, HTML, JAVA, PERL.Of course there is nothing in this universe perfect for God, of course, and there must be security holes or errors in this software Programs and systems prepared and built on sites and servers. And here comes the role of hackers in the discovery of these "gaps" as they call and translate them to serve them in access to the main files in the site, such as the Config file, for example.This file is one of the most important files forbidden to the public access to it. And read them, and these vulnerabilities are detected by special programs in the search for loopholes The most important of these gaps are discovered
- Perl loops, a type of programming language used in websites.
- CGI gaps are relatively weak gaps for other gaps.
- XSS loops and relies on the withdrawal of passwords from the ADMIN website.
- SQL gaps are low-use and depend on database errors in sites, servers and forums.
- FILE INCLUDE gaps are the most serious of all the gaps where it is possible to control completely the sites penetrated.
- Pitch formation phase.
- Pitch decompression phase.
- Patch encoding phase.
- Batch compression phase.
- Batch integration phase.
- The stage of sending the bat to the victim.