[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/lit/ - Literature


View post   

File: 213 KB, 1486x828, IMG_5363.jpg [View same] [iqdb] [saucenao] [google]
22634938 No.22634938 [Reply] [Original]

What book should I read to become a hackerman?

>> No.22634952

learn c++ the hard way
learn c++ for dummies
assembly for dummies

>> No.22634979

>>22634938
no one book in particular but the things you should learn;
>Machine Language
To understand computers on their most lowest level
>Popular Programming languages
You will want to understand the systems in which you're attempting to Crack (Hacking = Coding while Cracking = breaking the systems security or normal functioning to produce results you seek) so if you're looking to crack windows learn the languages in which windows is built upon
>Security
no explanation needed
>TCP/IP and Networking
for obvious reasons
>Memory
to understand how to use system memory to you advantage, for example - some crackers have learned that passwords are stored in plaintext within RAM and learned how to exploit this for their benefit

again anon, to be a hacker(read as 'programmer') or a cracker, you first have to learn the basics and then work your way up. it isn't easy but if you're dedicated you can become whatever you like.

>> No.22634982
File: 60 KB, 797x1000, IMG_5364.jpg [View same] [iqdb] [saucenao] [google]
22634982

>>22634952
Thanks.

>> No.22634996

snow crash by neil stephenson

>> No.22635001

>>22634979
How do I buffer overflow Israel

>> No.22635009

>>22635001
I just know the directions,
never driven the map so I don't fully understand what a buffer overflow is.

>> No.22635477

>>22635001
israeli hackers are the best in the world

>> No.22635491

>>22634938
Movies make it look cool but I imagine actually being a hacker is boring and entails a lot of drudgery

>> No.22635551

>>22634938
Start learning to code. There are thousands of resources available to start learning programing languages, don't forget to actually code.

>> No.22635679

>>22634938
rob pike's unix book

>> No.22635863

>>22635001
There is no need for that, God will do it.

>> No.22635895

>>22635491
Movies naturally 'normiefy' it. It absolutely can be exciting, but in a naturally geeky way where you learn how to manipulate and control various structures and explore what you can do with this, along with tons of 'downtime' where you're just combing through things for errors. The *beep boop* we're in the mainframe in five minutes stuff is hardly usual.

>> No.22635904
File: 68 KB, 474x675, th-840487520.jpg [View same] [iqdb] [saucenao] [google]
22635904

>>22635491

>> No.22636679

>>22635491
You’ll spend your time fuzzing, reading source code, disassembling programs, listening to techno music and pretending you’re the protagonist of a cyberpunk novel.

>> No.22637454

>>22634938
If you want to become a top 0.1% hackerman and not just another retarded code monkey see the following link
https://teachyourselfcs.com/

It's going to take you a long time to finish all the books listed, but it will be worth it.
Good luck

>> No.22637833

>>22637454
CS won’t cover anything related to actually breaking into computers.

>> No.22637957

>>22637833
that's not true.
ANYTHING a computer uses can be utilized against its system's defenses, ANYTHING.
you saying CS can't be used makes me believe you don't even realize viruses can be embedded into simple multimedia files such as jpegs, mp3s and even pdfs.

>> No.22637979

>>22637957
Writing viruses isn’t hacking in the way I define it. Hacking is what actually allows you to put the virus on the computer in the first place. Discovering a vulnerability in a program and using it to gain access to a computer is hacking. Putting a virus on the computer is just something you do after the fact. CS isn’t going to teach you how to find exploits and create payloads, at most it’ll help you understand those things at a deeper level.

>> No.22637985

>>22637979
>Writing viruses isn’t hacking in the way I define it.
you can not redefine CRACKING (Hacking is in its truest definition = CODING).
you obviously don't know what you're speaking of and redefining words to make your incorrect argument subjectively true = proof in the fucking pudding

>> No.22637989

>>22637985
No.

>> No.22638021

>>22637989
>No other response besides "No"
that doesn't make my response false or inaccurate just because you say No.
again, you obviously don't understand CRACKING and think you know what it is by redefining the word to suit your own misunderstanding once it was pointed out to you how wrong you are.
Damn - I just don't get why majority of you all are this ignorant and prideful about it.

>> No.22638026

>>22638021
No.

>> No.22638034

>>22638026
too prideful still.
feels good to make trolls reluctantly admit defeat.

>> No.22638893

Books won't cut it. You need actual analytic skills and creativity. Those can't be taught. Perhaps you should reach for something that's within your grasp, instead of daydreaming.

>> No.22638962

>>22638893
>t. metasploit skidder

>> No.22638977

How do I become the IT guy again? I feel like I haven’t been on the up and up with computers since 2009. Not even programming, but being the guy who can fix hardware/software problems. Now I struggle to even use windows 11 beyond the basics.

>> No.22638996

>>22634938
>comp sci fags be like it's simple all you need to do is learn complex relay loop string algebra, next master discrete variable analysis, learn how to write multi variate calculus functions in Ubul, learn string vector something or other, obtain a certificate in exponential isofractic bifurtal modal modeling . And you will be all set its that simple!

>> No.22639034
File: 16 KB, 256x256, IMG_4642.jpg [View same] [iqdb] [saucenao] [google]
22639034

>>22638996
Wrong, all you need is the Faustian spirit.

>> No.22640487

Hacking the Art of Exploitation

>> No.22640505

>>22638962
>t. shodan search engine user
heh, pack some more pdfs kiddo

>> No.22640517

>>22640505
I wish I had a shodan subscription.

>> No.22640534

Become Neo

>> No.22641098

>>22638977
Google/YouTube/Books on what you want to fix

>> No.22641312

>>22634938
C++ and network protocols I would say. It really depends on what yiu want to hack because the skillset is very different between a website and a magnetic door lock.

>> No.22641477

>>22641312
The only time I can think of C++ being used is if you’re writing malware or hacking video games or something. But I agree that it really depends on what you’re hacking. Some programs are written in C++ and if you want to hack those then knowing the language would come in handy.

>> No.22641517

"Hacking" as you call it is called cybersecurity professionally. I've worked in the industry. Sadly, it is mostly word tricks and spy games with corps and govts rather than phreaking or cool technical skills.

Even some of the sociopathic "social engineering" propaganda govt actors run on this site and elsewhere. That's what turned me off from the industry, seeing how the government manipulates its own people using propaganda, technology, and the internet. I was once a private cybersecurity contractor for the Department of Defense when I lived in the DMV.

It helps to have a professional certification in order to get work in the industry. You can hunt bug bounties as well. It really is not what it seems to be on the outside. If you are looking for a deeper technical challenge, consider programming. Because one feeds into the other.

If you do legal, professional private work then you are basically testing and fortifying networks. If you do government work then it is probably going to be federal LE or military. And if you are just a criminal hacker for money then you can go to prison or live like a rat in hiding from the authorities.

>> No.22641536

>>22641517
What tools do glowie hackers use?

>> No.22641564

>>22641517

It is because the entire industry revolves around information and the technology that facilitates it.

Information has value in itself. For example, credit card credentials. Some amateur could sell them for like $3 each to carders.

In the intelligence community, sensitive information and access to it has real, monetary value. Corruption is also real.

Media, including mass media and social media, journalism, is all about information and access to information.

In warfare, information directs everything, movements of units are based on information (or disinformation).

The issue is that our government sees us like a military target for psychological operations, propaganda.

It fears, rightfully so, that the people may revolt and become legitimate domestic threats for COIN.

In this case, the citizenry are like a neutral party for militarized propaganda operations.

Why do you think the police have been steadily militarized over the years? For fun?

>> No.22641576

>>22641536
All sorts, most of which you can get pre-installed on an SFOS like BlackArch. Kali used to be all the rage but BlackArch is the new hotness. My work involved stuff like teaching lil buzzcut military chuddies how to use Maltego, pretty basic stuff.

>> No.22641598

>>22641576
Does the military care about anonymity or do they just break into computers without covering their tracks? Do they have their own VPN/proxies/use something like TOR?

>> No.22642358

>>22634938
Security Systems are good enough that it's sorta pointless to focus on cracking and exploiting the software when taking advantage of people is so much easier.
It must have been a couple of years ago at this point but I remember hearing about a company being ransom attacked because an IT worker at the company found a USB stick in the parking lot and decided to check what was on it.

>> No.22642393

>>22634938
It depends on what you are interested in. What are you wanting to hack? For a baseline, learn to use your computer and learn some scripting language. shell, python, lua, common lisp, whatever just learn one and you're going to be fine. Then familiarize yourself with your default installed tools. That means Linux, learn gnutools, how to use grep / sed / etc.
No matter what all that is a good call. Now what are you interested in?
t. BA mathematics, BS compsci, masters in cybersecurity, PhD in mathematics (cryptology)

>> No.22642430

>>22642393
I like binary exploitation mostly.

>> No.22642507

>>22634938
just join the military for cyber security job. it's what I did. you need to be able to get a TS clearance though.

>> No.22642512

>>22642507
>just join the military for cyber security job
You don't need any qualification?

>> No.22642515

>>22641598
>Do they have their own VPN/proxies/use something like TOR?
I'd imagine so given that the military created TOR

>> No.22642519

>>22642507
Do they automatically turn you down if you have a criminal record?

>> No.22642521

>>22641517
>Even some of the sociopathic "social engineering" propaganda govt actors run on this site and elsewhere.
Examples? Tell us your glowie secrets

>> No.22642553

>>22642512
score well on asvab and dont fail schooling. I did it through navy because you can "rate lock" which basically means not go in unless you have that job. the cyber security job is called cwt(formerly ctn) for navy if you are interested just search that and +reddit or something to learn more about it. I would probably search for ctn over cwt as the name change only happened recently. there is a special program called "ion" too. job has a 6 year minimum total commitment though due to schooling. you only really get stationed stateside too, no boats or anything. get lots of free certifications also.

>>22642519
depends on the crime. they don't automatically turn you away though. you do need to be honest about everything though when filling out forms.

>> No.22642571

>>22642430
Okay. I'd suggest learning x86_64 assembly, C or C++, and then learn how to use xxd, strings, idafree. Your general subject matter to look into would be reverse engineering.
A few good books to look into:
>CODE (Charles Petzold)
This will teach you some pretty good fundamentals, but you won't get stuck down there for ages.
>Reversing (Eldad Eilam)
It's in the title.
>C++ by Stroustrup
A lot of people tend to stick with c++11 or c++14, but there's nothing wrong with c++20 outside of it just having more expensive books. I usually just recommend people become a little familiar with an older version (c++11) and then when they're comfortable, then make the leap to a c++20 book. You have to be open minded enough to always want to learn new standards, though. Otherwise, you're screwed.
>K&R's C
This one is pretty standard for learning C.
I don't have an asm book to recommend. Once you have an understanding of how registers work, a basic understanding of memory/address/etc, and a few of the more common keywords, just jump right in and look up what you don't understand.
Deconstructing your own C/C++ can help with understanding what the keywords do and how assembly works (via your compiler anyways.)
Everything else you'll figure out as you go on. Good luck and WPWW.

>> No.22642574

>>22642571
Based and thanks.

>> No.22642593

>>22634979
>>22635551
>>22640487
>>22641312
>>22642393
I did all of these things. I learned C/C++. I learned everything I could about linux. I learned about networking, but nothing ever came of it. This was a few years ago now, and I didn't do any "hacking" and wasn't able to get any job or internship. I focused more on programming afterwards. Now I have lost all my passion for the field and looking at this stuff doesn't make me happy like it used to, I haven't touched my computer in a couple weeks, and I have an aversion to anything software related.

>> No.22642611
File: 567 KB, 828x1142, IMG_5401.jpg [View same] [iqdb] [saucenao] [google]
22642611

>>22642574
Also, I would recommend this to anyone who wants to start learning assembly. A decent grasp on programming is recommended.

>> No.22642634

>>22642593
Are you still interested in hacking? You could always try your hand at some ctfs/labs if you’re up to it.

>> No.22642646

>>22642634
Yeah maybe. It would be cool if there was something programming-focused lime eulers list and untimed. I just don't use my computer often enough to spend any time on it. Because of that, I sometimes view the time that I spent learning this stuff as wasted, because I can't apply it to other things.

>> No.22642670

>>22642646
I usually go back and forth between my interest in literature and technology, and when I get burnt out in one I just go back to the other. I’ll go months without touching my computer and then get a burst of inspiration to start doing again. You might be interested in some reverse engineering/memory corruption challenges since you mentioned programming. You could create your own insecure programs and try to exploit them or download one off the internet.

>> No.22642690

>>22642670
I suppose. I've always wanted to try to reverse engineer and modify old games, but I feel like it's too late for me now. I am pursuing an entirely different career, and I'm not a teenager anymore.

>> No.22642730

>>22642690
Hacking games is what got me into computers because I wanted to make cheats for the games I was playing. It’s very tedious but also rewarding. Good luck with whatever you choose to do.

>> No.22642782

>>22642553
>you only really get stationed stateside too, no boats or anything. get lots of free certifications also
Damn, sounds kinda boring desu

>> No.22642834

>>22642574
Cheers
>>22642611
That's not my recommendation. I'm sure it's fine, but all I just have is a riscv book on my shelf and a printed out manual for intel's assembly (It's free and cheap to print yourself if you have a laser printer.)
>>22642593
>but nothing ever came of it
Because you gave up. Either you gave up because you, unconsciously, recognized that you weren't any good at the hacking part, or you gave up because you weren't invested enough into the idea of doing it. The latter could have been anything, maybe you weren't applying yourself enough to things like CTFs and (good) certificates,
I wanted to point something out:
>>22635491
This comment is what most of the people in this field feel and it is because they aren't doing it for the right reasons. If you are bored while staring at a debuggers and buffers, then this isn't the field for you.
If you are bored doing write-ups, I understand. But everything else? If it's not fun, you aren't supposed to be here. Keep in mind that if you can't figure it out before college, you won't make it in any meaningful capacity after college. You might get a job. You might get paid well. You'll probably hate your life though and all that money will likely be spent on drugs, liquor/beer, and garbage you don't need. You have to have the mind for it.
Now if you just want to set configs so that it's harder for people to get in your machine, by all means. If you want to find strings that are hidden in everything, go for it. But everything else is probably not going to be fun for you if you don't automatically have the genuine interest, and I don't mean a stupid title.
It's not hard to crack someone's WiFi and MITM your friend then replace every image he see's with a picture of a butthole using a guide, but unless you understand why airdump/aircrack work and how bettercap works, you're stuck following other people's solutions.
Good luck, I am leaving the thread.

>> No.22642884

>>22642834
I disagree slightly. For me hacking is about the goal and the process is just a means of getting there. I don’t know a lot of people who can get enjoyment out of tinkering with disassemblers and bugs all day every day, but the goal is what keeps you going. I do agree that you need a serious drive to actually do it and if you don’t have it then you’ll give it up once you find how much work you have to put in to get there.

>> No.22642993

>>22634938
give up; just play video games

>> No.22643314

>>22642993
India #1

>> No.22643322

>>22642593
Meh no harm in it it’s just not for you. People make that stuff seem so cool but it’s nerdy and autistic as can be. The people who are really good at that have a passion for it most of the time.

>> No.22643715

>>22642834
>recognized that you weren't any good at the hacking part
For me there was no hacking part. There was nothing "to be good at".
>you are not autistic enough
Maybe. But debugging, understanding how airdump works, these are things that I have always wanted to do, networking in particular. I read beej's guides but I didn't have the attention span to sit through 1000 pages of a book about the linux kernel

>> No.22643919

>>22642553
The Army has similar positions, 17C cyber warefare specialist or 35N signal intel analyst with the C2 ASI from JCAC. Some anons ITT might consider them over the Navy for whatever reason.

>> No.22643993

>>22643919
I think 17c is the only equivalent and 35N isn't really cyber, similar to how ctr or ctt in the navy isn't really cyber either. but I could be wrong about that as I wasn't really interested in army.

>>22642782
eh to me its fulfilling work. the navy to me is a 9 to 5 job that has low pay for a few years in exchange for teaching me. so when I get out I can get 100k job easily doing cyber if I want. or I can stay in and be an officer and get paid well.

>> No.22644063

>>22643993
35N isn't cyber, but after going to JCAC they can do cyber stuff since the course is basically just the first half of 17C AIT.

>> No.22644719

>>22634938
if you wanna hack the universe:
1. The Lambda Calculus: Its Syntax and Semantics
2. Proof Theory and Logical Complexity
3. Lectures on the Curry-Howard Isomorphism
4. Categorical Logic and Type Theory (alternatively: Practical Foundations of Mathematics)
5. Category Theory (Awodey)
6. Practical Foundations for Programming Languages

>> No.22644884

>>22644063
What exactly do they teach you in the military with regards to hacking? Are they covering tools/networks so you can pentest your own stuff or is it based around hacking other nation states?

>> No.22645498

>>22644884
im >>22644063, but I never trust myself to know what I can and can't say. however if you search "ctn occupation exhibit" the first link should be a document that goes over description of different ranks of ctn, and college class equivalent. and if you search for ctn(or cwt) and ion you will get some more info too. there is also a YouTube video with William Osman and the navy titled "how to secure your wifi according to a ctn".
Schooling itself for navy is 26 weeks long of 8-10 hours a day of classroom/studying.

>> No.22645503

>>22645498
I'm not >>22644063 but rather >>22643993. oops

>> No.22645654

In Th Beginning was the Command Line - Neal Stephenson
The Telekommunist Manifesto - Dmytri Kleiner

>> No.22647098

>>22644719
>Categorical Logic and Type Theory
Hello, knower, is this the best book on categorical logic? I was thinking of getting Lambek's intro originally but this seems much better

>> No.22648033

>>22635001
Install Microsoft Hitler

>> No.22648290

>>22648033
Based