Sololearn: Learn to Code
New course! Every coder should learn Generative AI!
Try a free lesson
+ 40
In order to break the rules, you need to learn the rules.
18th Jun 2019, 2:07 PM
Yathin Babu
Yathin Babu - avatar
+ 31
The first rule of Hacker Club is: You do not talk about Hacker Club. F*ck, now we're both out of the club. Thanks. :(
18th Jun 2019, 2:00 PM
AgentSmith
+ 12
lolol I'll assume that to be sarcasm, Prince PS. Either way, I promised a Native American that visited me in my dreams while sleeping last night that I would be nice today. @Yathin Babu Exactly. A locksmith is only as good as his knowledge of lock mechanisms and the tools to manipulate them. When in doubt, Google such things and properly learn. If your goal of becoming a hacker requires you to post on public forums using your real name, I'd probably reconsider my life choices. ;)
18th Jun 2019, 2:11 PM
AgentSmith
+ 10
As a couple of users have pointed out already, there are already similar (if not identical) questions posted, such as the one(s) above. You can find the answers using the search feature. Please help keep the quality of posts high in this section of the forum, SoloLearn servers uncluttered, and app latency low by reviewing the following: https://www.sololearn.com/Blog/38/8-simple-rules-to-get-help-from-the-community/ Be sure not to miss the link to the Community Guidelines toward the bottom of the article. Happy coding! P.S. Please see the following post for a humorous interpretation (but still an earnest plea). https://www.sololearn.com/post/10362/?ref=app
19th Jun 2019, 3:20 AM
Janning⭐
Janning⭐ - avatar
+ 8
This post will be helpful for you : https://www.sololearn.com/discuss/563537/?ref=app Thanks
18th Jun 2019, 2:00 PM
Prince PS[Not_Active]
Prince PS[Not_Active] - avatar
+ 8
@Aayush Pagare Start with something like https://www.cybrary.it/ - it'll get you started on some of the basics of it. I'd also recommend that you get an external hard drive, install virtual box & Kali Linux on it, and also purchase a wireless card that's capable of packet injection, among other things. You can easily use Google to search for such things and find one that's a good price for you. https://www.amazon.com/Alfa-Long-Range-Dual-Band-Wireless-External/dp/B00VEEBOPG ^That's the one that I personally use for such things. It's dual-band and also has a decent range on it. Once you learn the basics and have a good idea of what you should learn further, then begin to seek out resources online (easily searchable on Google) and continue educating yourself. Also, while you're at it, come up with an alias for you to use so you're not using your real name online. Seriously, all of you that use your real name is creating a security issue for your own selves and possibly your families. Always secure yourself first before you worry about the security of others.
18th Jun 2019, 2:17 PM
AgentSmith
+ 8
Here I have a description of hacking tools for you: https://code.sololearn.com/WAhEzudxLVWC/?ref=app
18th Jun 2019, 4:58 PM
Jan Markus
+ 7
AgentSmith thats pretty cool, now can you take me to the Hacker club, hope I didn't mention the Hacker club
18th Jun 2019, 2:23 PM
✳AsterisK✳
✳AsterisK✳ - avatar
+ 5
*AsterisK* whoops, sorry. Did a quick ctrl-f and spotted 2 instances of "hacker club"
18th Jun 2019, 2:53 PM
Trigger
Trigger - avatar
+ 5
@ Trevis Schiffer You certainly make some points. As for terminology, although you're not wrong, it doesn't much matter in regards to communication; the only thing that matters is what they understand it to be. We've been having this discussion for decades and the reality is that too many people define it differently, despite whether it's accurate or not, so it's easier to communicate with them via their language. lol At this point, the original terminology doesn't much matter anymore, even in most professional fields that deal with it. I rarely hear people use the different "hats" terminology now either. I'd say the movie "Hackers" and other such media from back in the day is to blame for this. **smashes hands into keyboard randomly for 5 seconds before drawn out press of 'Enter' key** "Okay, I'm in!" XD In regards to Kali, it's useful to those that have an interest in this and is trying to learn, as it's certainly a good learning tool and makes practicing certain concepts a lot easier. If they're on a website like SoloLearn asking this question, they're clearly not ready to create their own tools. ;) However, I do agree in the long run that one learns how to properly create their own tools, especially considering how often things get patched/updated over time. Although a lot of "art" is actually learned, and the same with this subject also, the creative/imaginative part of it comes from you and that side of people isn't taught. It's like someone playing music and someone playing music with passion; completely different. Along with the whole "hacking" subject, there is a lot more psychology/communication that takes place than other stuff most often. What's the easiest way to get through a locked door? Have someone willingly give you the key to it or open the door for you. It's a lot easier to trick people than it is to kick your way through doors or sneak in the back window. The minds of others are just another system to manipulate for your purposes and most don't properly secure their minds.
19th Jun 2019, 4:38 PM
AgentSmith
+ 4
Good to see you AgentSmith 👍 Keep helping
18th Jun 2019, 2:02 PM
Prince PS[Not_Active]
Prince PS[Not_Active] - avatar
18th Jun 2019, 2:17 PM
Trigger
Trigger - avatar
+ 4
Learn linux
18th Jun 2019, 3:55 PM
haydenki
haydenki - avatar
+ 4
@ Darcy Dar'c That's not true. What you're capable of isn't what's good or bad, it's your intentions that are good or bad. As they say, "You can use electricity to cook a man's food and you can also use it to cook a man." The point being is that most things can be used for good purposes and they can also be used for bad purposes, although good/bad is certainly relative to the one defining it in such ways; it isn't absolute. It's kinda like psychology. You can use psychology to help someone and save their life, but you can also use it to manipulate someone and ruin their life. In this particular example, you have your black hats that have malicious intent and your white hats that are meant to counteract black hats and provide security. Both are capable of either extreme, but their intent is what determines where they currently stand. Those aren't the only two "hats" but the opposing ends of the spectrum. As an added example, you have gray hats that aren't necessarily either, they're typically not in it for malicious intent, but they aren't necessarily against breaking the rules for their intentions; as the name implies, they're in the gray area in between.
20th Jun 2019, 2:09 PM
AgentSmith
+ 4
@ Everyone Since we're all here talking about this together in a productive way, from a security standpoint, please change your names to something other than your real names. It baffles me that you all trust people online enough to share your personal information so freely. It would take me less than a minute to find out a lot of personal information about some of you simply because you use your real names. If I can easily do that, imagine someone that has malicious intentions for you instead of words of advice? As I mentioned above, top priority should be securing yourself prior to worrying about the security of others. Let's say someone made subtle remarks here that let us know that they play Minecraft, which lets us know they're probably on the younger end; mid-late teens more than likely. They used their full name, so with a little investigative work, one could easily find them and confirm it's them by finding something related to Minecraft/their age range. Then one could easily become their friend elsewhere and use psychology to show fake interest in their interests because they share that info carelessly online to be social like most people do. By showing interest in other's interests, you can easily gain their loyalty and trust over a short amount of time. Since 99% of people use the same password for multiple things, you could easily create a game with multiplayer support, tell them that you're working on a game and want their opinion, they'll eagerly test it for you and sign up. At this point, your database will capture their email address and password, and chances are it's the same password they use for their email + other accounts. Now you have access to their email address, and as most of us know, your email account is going to reveal all of the other accounts you have elsewhere, personal information, and also the ability to change the password to those other accounts by having it send a reset email to you. My Point: Change your name, stop sharing personal info online, get off social media.
20th Jun 2019, 2:55 PM
AgentSmith
+ 4
AgentSmith Well said👌👌 , I have also seen many sololearners sharing their personal information with the one about whom they don't know . Actually , In today's world social media has became addiction 🤖😐 , even we can't live without mobile or computer for just 1 day. Many of us , sorry not many , nearly all of us are involved in social sites ( mainly Facebook )😮 . So it is certain that some people "will" have intentions for malicious activities😢. Even in today's world , because of so much involvement in social media , such crimes ( as listed above in your answer ) have became common such as phishing etc. And we are the ones who are giving our personal information to others. By the way Awesome example😉. #Stop_Social_Media_Addiction🙏 AgentSmith , one suggestion for you , do not use ' ' a space after @ sign just type this : @username I have seen most of your answers have a space after @ sign and that will not result in referring to someone . Thanks
20th Jun 2019, 4:06 PM
Prince PS[Not_Active]
Prince PS[Not_Active] - avatar
+ 3
What do you plan to hack?
18th Jun 2019, 10:39 PM
Sonic
Sonic - avatar
+ 3
Be perfect with the basics and learn coding languages like c, c++
19th Jun 2019, 1:12 AM
PRASAN21
PRASAN21 - avatar
+ 3
Beying a Hacker is not that hard as long as you learn to understand what you read. There is a lot of work to do. One should start learning about Compilers, operating systems, netwotking assambly, hex editors and ofcourse about exploits, phishing, viruses and most important....Buffer Owerflow. After you know all most everything about them ... probably you become a Hacker.
19th Jun 2019, 9:54 AM
Michael Buzgaru
Michael Buzgaru - avatar