How are hackers graded and how are hackers graded?

Updated on technology 2024-02-08
9 answers
  1. Anonymous users2024-02-05

    What level of hacker do you belong to?

    1 I don't know much about computers.,Authentic rookie.,The next program is called a bomb.,Just go to attack.,I don't know what a platform is.,Sometimes you can successfully make the other party crash.。

    Features:There are a lot of tools in the hard disk,Frequent Internet chats,MM envy a lot of them,But IQ can not be guaranteed。

    2 Have some understanding of computers, but basically don't know how to program, understand the basic principles of some platforms and vulnerabilities, use ** tools, or use them after asking. (Many middle school students like to do this the most).

    Features: Can be taught, at least a little bit of understanding of computers.

    3 should also be a system administrator, interested in system security, familiar with Unix or Windows one or more platforms to give you an admin root password, you can do whatever you want to do (refers to knowing what commands to do, this is actually just the basis of the general system administrator). (Actually, just a system administrator).

    Features:Some ** published on the Internet,You can use it just by looking at help.,No need to ask people.,But generally won't change the bugs.。

    4. I am very familiar with various systems, I am very clear about some details, I have certain programming skills, and I can understand the exploit written by others(There is a certain level).

    Features: Hackers who can be called masters, but many normal work and security are irrelevant, just interests, and generally have no time to chat and post on the Internet. Because research is time-consuming and laborious, I often don't get good grades when I study, and my favorite mm always brings regrets.

    5. Be able to find bugs, be able to write and utilize**, understand the security of various systems, and be particularly good at some platforms.

    Features: Real masters, not many in China. Professional security workers, who have more contacts with foreign hackers, are generally not interested in politics.

  2. Anonymous users2024-02-04

    It's good to be a hacker, but don't hurt anyone.

  3. Anonymous users2024-02-03

    The level of hackers can be illustrated by the following 7 levels:

    Level 1 - Stunned [Millions]: Able to use security tools, and can only simply scan and decipher passwords.

    Level 2 - System Administrators [tens of thousands]: Make good use of security tools, especially familiar with systems and networks.

    Level 3 - Developers of large companies or core security companies [thousands of people]: Particularly familiar with the operating system, start developing**, write your own scanners.

    Level 4 - Able to find and exploit vulnerabilities [hundreds of people]: can find vulnerabilities by themselves, find 0day by themselves and write exp to exploit vulnerabilities; Perform protocol tests on the system to mine vulnerabilities.

    Level 5 - High level [less than 100 people]: People who defend and build systems.

    Level 6 - Elite [dozens to dozens]: Deep understanding of operating systems.

    Level 7 - Big Bull Cow [Few]: Mark Zuckerberg, Albert Einstein, and other people who changed the world.

  4. Anonymous users2024-02-02

    There are two general classifications. Script naughty and hackers. Scripting children who can only use existing hacking programs for processing or can only use them directly are people who do not have the ability to program independently.

    Hackers have different definitions in China: Red Ke: The name given by Chinese hackers.

    The English "honker" is the transliteration of Hongke. It's a group of hackers fighting to defend China's sovereignty: they're targeting software that needs to be registered.

    They usually use debugging to find out the password in memory: refers to some exploits or exploits system vulnerabilities, of service) systems, or makes personal operating systems (Windows) blue screen flyers: often exploit vulnerabilities in program-controlled switches to enter and study telecommunications networks.

  5. Anonymous users2024-02-01

    。。It's all nonsense.

    The 0day vulnerability is easy to exploit, and it is an individual who can take the shell from batch scanning.

    Basically, if you want to enter the industry to invade the host, you are familiar with the metasploitframework, and the entry invasion ** is to learn to understand php, js, html, mysql, mssql and the like.

    Script kid is very easy to do, do a good job of pre-infiltration, nmap scan the port, check the vulnerability, and then select the vulnerability, send the package, get the control, and infiltrate after the meterpreter.

    There is also a very simple tool such as cnchopper, the principle is that the Trojan takes the shell and then raises the power.

  6. Anonymous users2024-01-31

    There is no hierarchy for hackers! Only red customers have!

  7. Anonymous users2024-01-30

    Xiao Xiaohei: Most beginners are at the stage of knowledge accumulation, know a certain amount of programming knowledge, and at least can program some fools. I have some understanding of the hacking process, know how to use some scanners, and have seen a certain number of tutorials, but I have not successfully invaded once.

    Hacker: The sign is that the invasion is too medium** and the whole body is out, and there is a lot of experience in invading small stations. Proficient in programming, can write the program he wants as he wants, reach the level of a senior programmer, and can make web pages such as asp php html.

    The programs and pages are all of a professional standard

    Heizun: Invade the U.S. Department of Defense and other world networks, stand at the forefront of hacking technology, and seek defeat alone...

  8. Anonymous users2024-01-29

    The upstairs is your own share. Hackers are hackers, and there is no level of ability. Good with bad.

  9. Anonymous users2024-01-28

    Apprentice, Beginner, Intermediate, Advanced, Elite, Great God.

Related questions
6 answers2024-02-08

Geography: As a discipline, there are many things in common with other disciplines in terms of law. Such as: >>>More

13 answers2024-02-08

It's hard to match a single immortal if you don't have a single immortal. >>>More

11 answers2024-02-08

Can't remember words? I'll tell you.

20 answers2024-02-08

How can a girl be ugly, I personally think that there are two aspects to girls who are ugly: 1, they are not good-looking, such as: bad breath, backward dress, straightforward personality; 2, it is not very good-looking, and it is vicious; >>>More

3 answers2024-02-08

There is no need to memorize words alone, just memorize them together with sentences, and know the meaning when you memorize them, which is much easier and less easy to forget. Another way is to memorize 5-7 a day, consolidate it the next day, consolidate it after a week, and consolidate it after a month. ]