Results 1 to 20 of 20
Hybrid View
- 24 Aug. 2012 03:40pm #1
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 278.00
If anyone is looking for some books
- 24 Aug. 2012 04:57pm #2
- 24 Aug. 2012 06:05pm #3
- 24 Aug. 2012 08:54pm #4
- 24 Aug. 2012 10:39pm #5
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 115.00
- 24 Aug. 2012 10:56pm #6
- 24 Aug. 2012 11:59pm #7
- Age
- 97
- Join Date
- Nov. 2009
- Location
- In the computer
- Posts
- 11,186
- Reputation
- 1029
- LCash
- 55.00
- Awards
I dont like reading.
- 25 Aug. 2012 03:11am #8
- 29 Aug. 2012 03:19pm #9
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 163.00
- 29 Aug. 2012 04:04pm #10
- 29 Aug. 2012 04:16pm #11
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 2073.00
And since when have I posted anything about hacking here on LG? The closest I've ever come to it was posting a PHP backdoor that I had translated and updated a bit somewhere, but that was back when I was just experimenting with PHP. I just finished Chris McNab's Network Security Assessment, and I'm now reading Eric Cole's Network Security Bible. At the moment I've been learning about Network Security, because I already know most of what there is to know about web-based security, whether its XSS, RFI, SQL Injections, getting past file type uploading restrictions, etc, so I'm now refining my skill in true hacking, such as things like buffer overflows, utilizing current-gen exploits, DNS zone transfers, reverse DNS sweeping, SMTP probing, etc.
Sure, my programming skills might not be up to par with what is considered a true programmer's, but hey - I don't program much, and what I do program is just quick little stuff that I may use once or twice, and are either private for only me or are used by a few people at most.
- 29 Aug. 2012 04:23pm #12
lol. I do believe you have long milestones to go in the world of computing. Simply reading books on the topic isn't going to help you much. "Knowing is not enough, you must apply; willing is not enough, you must do." -Bruce Lee
At best the most you've done is scratch the surface of what those things truly entail. Do you know what causes XSS holes? Do you know of any way to exploit them other than using pre-made queries (i.e. the traditional <script></script>)? Have you experienced hands on what causes stack overflows and things of the like? Most likely not. None of the things you mentioned are near significant.
Programming is a prerequisite to "hacking." Anyone who believes otherwise is not truly a hacker. To be a hacker you need to understand the ins and outs & nuts and bolts of these things. You also misuse the term "hacker." Hacking is any act of playful cleverness. Not the exploitation of security.Last edited by The Unintelligible; 29 Aug. 2012 at 04:26pm.