Posts

Hacking into Gamma is like eating popcorn

| | | | __ _ ___| | __ | __ ) __ _ ___| | _| | | |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / | | _ | (_| | (__| < | |_) | (_| | (__| <|_| |_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_) A DIY Guide for those without the patience to wait for whistleblowers --[ 1 ]-- Introduction I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I'm writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started. And trust me, once you've learned the basics you'll realize this really is easier than filing a FOIA request. --[ 2 ]-- Staying Safe This is illegal, so you'll

Hacker Who Hacked Hacking Team

| | | | __ _ ___| | __ | __ ) __ _ ___| | _| | | |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / | | _ | (_| | (__| < | |_) | (_| | (__| <|_| |_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_) A DIY Guide ,-._,-._ _,-\ o O_/; / , ` `| | \-.,___, / ` \ `-.__/ / ,.\ / `-.__.-\` ./ \' / /| ___\ ,/ `\ ( ( |.-"` '/\ \ ` \ \/ ,, | \ _ \| o/o / \. \ , / /

Which Programming Language are Useful for Hacking

Image
Important Programming languages for Hackers Many of our readers often send us queries about which programming language they should learn. Some want to know quick fix hacking solutions. Almost all tech gadgets are built with coding. Every App, game or site that you use is programmed in a particular computer language. You need to know that hacking is not a click-of-a-button job but a serialized and compartmentalized vocation which uses different programming languages for different uses. Most of the websites out there will give you list of most popular programming languages in the world. We at Techworm try to make it more easy for budding security researchers and hackers by breaking up the programming languages used by hackers. Hacking is usually meant to break a code. There are three sections of hacking ― Web Hacking, Exploit Writing & Reverse Engineering and each of it requires different programming language 1. Web Hacking  Since most of the tech is build around wo

Getting Started with Python Programming Language

Image
Getting Started with Python: Most are afraid to start because they are not “programmer” they didn’t take comp sci programming is hard. Given python a chance its a lot easier than you might. Here are some good resources (Our Python Tutorials, Violent Python (Book), Cybrary Python Content, Blackhat Python (Book), Python for Pentesters by Securitytube.net, Udemey, code academy, PyMOTW, etc.) You need to give yourself a project – start simple and build up. Consider parsing a log file then moving to something more complex. You need to practice its kinda like learning a instrument. Teach people after you learn it – you learn the content at a deeper level. How has it helped our careers: Better troubleshooting skills. Automate tasks so you can focus on other problems. Helps with exploitation and understanding vulnerabilities at a deeper level. You can generally understand other languages. Lots of time I find myself with output form one tool that needs to go to another. Opens

What is Reverse Engineering?

Image
Reverse engineering is taking apart an object to see how it works in order to duplicate or enhance the object. The practice, taken from older industries, is now frequently used on computer hardware and software. Software reverse engineering involves reversing a program’s  machine code  (the string of 0s and 1s that are sent to the logic processor) back into the  source code  that it was written in, using program language statements. Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a  bug  (correct an error in the program when the source code is not available), to identify malicious content in a program such as a  virus  or to adapt a program written for use with one microprocessor for use with another. Reverse engineering for the purpose of copying or duplicating programs may constitute a copyright violation. In some c