Home > Common Problem > body text

What language do hackers use to program?

(*-*)浩
Release: 2019-09-18 11:08:46
Original
25523 people have browsed it

Hacker is a Chinese word, both derived from English. With the emergence of Gray Pigeon, Gray Pigeon has become a hacking technology used by many people to control other people's computers in the name of hackers, so there is a separation between "hacker" and "hacker". The movie "Hacker" produced by the Movie Channel Program Center in 2012 has also begun to use the word hacker, showing the convergence of Chinese usage habits. In fact, the meanings of hacker (or hacker) and the original English word Hacker cannot be completely translated. This is due to the differences formed in the respective development of Chinese and English language vocabulary. The term originally referred to enthusiastic and highly skilled computer experts, especially designers, and was gradually divided into categories. Among them, black hat is actually a cracker. In media reports, the term hacker often refers to software crackers.

Recommended course: C Language Tutorial.

What language do hackers use to program?

It is true that hackers are so far away yet so close to us. I accidentally got poisoned, and my friends who use windows are trembling all the time. One day I accidentally clicked on an Internet link, and my computer turned into a chicken. Now we have to give it a big health care after installing the machine. What about guards, anti-virus, bug fixes? The machine can be slower, but it cannot be poisonous. Because we are all scared by some viruses, even a panda burning incense can make people panic.

Speaking of which, I took a look at who is the author of Panda Burning Incense?

Li Jun is a computer enthusiast who has never received professional training. Panda Burning Incense written in delphi, what language is delphi? It is a well-known rapid application development tool (Rapid Application Development, referred to as RAD) under the Windows platform. Delphi launched by Borland is a new visual programming environment that provides us with a convenient and fast Windows application development tool.

It uses many advanced features and design ideas of Microsoft Windows graphical user interface, adopts a complete object-oriented programming language (Object-Oriented Language) that is flexible and reusable, and is the fastest editor in the world today. , the most leading database technology. In fact, delphi is a graphical development tool. Delphi itself is not awesome, what is awesome is its designers. Delphi should be much simpler than C language.

General hackers can be classified as using hacking tools:

1. Basics of hacker terminology: mainly clarify some common hacker terminology, such as what is webshell What is injection, what is side note, and the functions of some common tools, such as nc, sc, etc. Also, when you encounter a hacker term you don’t understand, you should first understand the meaning of the term. Go to Baidu Or GOOGLE first checked what he meant. When studying, you should not vaguely approach knowledge that you do not understand. To find out first.

2. Configuration and use of Gray Pigeon: Through learning, you must correctly configure Gray Pigeon and be able to go online normally. Operate and train its functions. Needless to say, the one that junior hackers hear the most is pigeons.

3. Web Trojan production and dissemination

4. Website intrusion

5. Trojan signature code modification

In fact, I don’t think someone who can use tools can be called a hacker. Hacker is a synonym for high-ranking people in the programming world. Only those who discover vulnerabilities like OpenSSL Heartbleed are called hackers. They are all programming masters. C/C and assembly language are the tools used by real hackers. Understand the operating principle of the program and the working principle of the system. Only in this way can the problem be fundamentally solved.

A true hacker must be a qualified programmer. Basic programming language is a must, and his knowledge is broad and deep:

1. Be proficient in C/C language and assembly language (which languages ​​do you know)

Basically, novice hackers must learn disassemble ), which is to analyze the source code of a program through the assembly routine it runs. And tested in c language. Assembly must be mastered (stack, protectedmode, data segment, ESP, EBP...), C language (bit-field, stdcall...), python..

2. Computer principles

The analysis program data does not have decimal, only binary and hexadecimal (that is, 0101 0010 or 0xFF...), you must understand basic operations. There are also basic terms such as big/little-endian, and you can use WinHex/UltraEdit or VS's dempbin analysis program.

3. Network

TCP/IP (TCP, UDP, ICMP, DNS, IP and many other protocols), will intercept data packets, analyze frames, and combine Use telnet/ftp/c language socket and other commands to perform network robberies! This part is the most difficult and boring, and every byte of the network cannot be missed.

4. System

Understand various systems such as Windows internal API, sockets programming, IP proxy, system design pits must have loopholes, only we have mastered the principle , the melon will be touched.

Having said so much, it is not easy to be a hacker. Do you have any thoughts on this?

Also, hackers must be dark! Nowadays, many people are still making fuss at the web page level, that is, injecting some js language into the web to execute scripts that do bad things. This requires a deep understanding of the browser's core and web page language. There were still considerable loopholes in the Android browser at first. The author once modified the browser kernel code to avoid some unconventional script injections. The scope and methods of hacker attacks are endless, so being a hacker is first of all a kind of geek. Hackers have great faith that they can create things, and they work tirelessly to crack them without stopping. Isn't this the epitome of programmers working diligently to modify bugs in order to complete a project.

The above is the detailed content of What language do hackers use to program?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template