December 2020
All about hacking and cyber security I present ways of hacking over all platforms also trending news & info bugbounty tutorial for penetration testers

 

Best Programming Languages To Learn For Hacking


Before I get into this article, it's very important to recognize that hacking can be dangerous. Don't do it unless you know what you're doing. And you know that what you're doing is legal. Whenever practicing hacking, it should be done responsibly and ethically, or else you could end up in prison, or worse financial turmoil, then you'd be in debt. Like the government. 

There are three fundamental types of hackers white hat, black hat, and grey hat. 

A white-hat hacker is somebody who hacks ethically and responsibly and they use their skills to help catch other hackers. They're also often hired by companies to handle security measures, and build anti-hacking software, which is really important and vital work in the world of information technology, especially now that everything is becoming attached to the Internet of Things. 

Then, of course, we have the Black Hat Hackers, people who use their skills for malicious intent things like creating viruses using keyloggers to steal your information, hacking banks, and even hacking servers, their goal is to break in steal information, and sell it for money. 

Really, nobody likes those guys, because they negatively affect everyone for the benefit of themselves. 

Last but not least, we have the grey hat hackers, people who find themselves somewhere in between. These are usually people that don't have malicious intent. But everything they do is usually self beneficial. 

In general, they auction their abilities to the highest bidder, a gray hat hacker will often look for backdoors and security problems with the system, and then they'll sell the solution to the company for the price. 

Before I can really talk about what language is the best for hacking, you first have to understand that there are different types of hacking, the language, and system you use for a server is not necessarily the same that you'd use for a personal computer before you look for any absolutes is what you should or shouldn't be using, you should recognize that there are many different types of hacking because there are many different types of computer systems. 

Because of this, there are many different languages you could utilize to hack any individual system. There's really two different levels of hacking, high-level hacking, and low-level hacking. 

on the high end of the spectrum, we have the easier to use languages often interpreted or intermediate, Python, Ruby, JavaScript, Java, C#. Because these languages aren't compiled, they're much easier to work with. 

Because everything is compiled on the fly. a language like Java is both interpreted and compiled. This allows it to be incredibly easy to work with. That's why a lot of hackers prefer it, not to mention most of the world servers run on it. 

However, Java is really only useful if you're hacking servers and people's back-end computer systems. Let's say you want to hack a robot, or an electronic device, maybe even a car, the only way to do that is with a lower-level language. 

On the lower end of the spectrum, we have compiled languages like C and c++. And although they're not as easy to use, they are more powerful.

There's very little you can't do with C or c++.

what I wanted to show you were a hierarchical ladder, from the hardware all the way up to the highest level of abstractions. Here we have the CPU or the hardware itself, which obviously runs on electricity and hardware components using electricity since zero and five volts signals to determine what to do internally. 

The 0 in machine language or binary represents false which is nothing in the one represents true or five volts on top of binary and just a little bit abstracted from it is assembly it's really the lowest level human-readable writable language assembly or assembler is a platform-specific language designed for a certain architecture. 

So Mac and Windows may not necessarily have the same assembler because their architecture usually differs. 

But we're not going to get into the different types of assembly and assemblers because that's really beyond the scope of this Article. 

From here we go up to what is likely the lowest level language still in common use today. And that C, C is really close to the hardware for practical language. 

But it doesn't offer many abstractions that people often desire today, such as object-orientation. Because it doesn't offer many of these modern features, the language is more streamlined. 

And one might even argue easier to grasp at first, mostly because it has less bloat. It's strange because C is really easier to learn than most languages in some respects, but it's harder to master. 

And there's sometimes more to know about it, especially because the systems we control with it are generally a lot more complex. However, these days there's not really a lot of languages other than C that retain that low-level ability to program micro-controllers and things of the sort. 

C is a procedural language, and it was really the first language I ever learned. I'm glad I started with C though and if you have a good mind, plus, enjoy reading and studying things for yourself, then I do highly suggest starting there. 

There's really no language on a computer that comes even close to being as supported on as many devices as C and its use is still just as relevant today as it was years ago when I was first introduced. 

It's wild to think how much hardware has changed in that time. But language is really really haven't evolved much at all C is still the world's fastest compiling language supported on multiple systems due to that really low overhead, 

 

 

then we shift a little from here to c++, which is basically c but with object-orientation added to it. And a ton of features. 

Nobody really uses c++ is a wonderful language. But many people who use it especially for lower-level microcontroller engineering, or game hacking will tell you a lot of the features it has come with cons that kind of outweigh the benefits.


C++ is great if you need low-level control, and also that object orientation and extra abstractions. But if you're just looking for something that compiles fast, and has the smallest package possible, you're definitely looking for See, it's funny because the design of a virus or hacking actually has many of the same requirements as traditional programming and development. 

So ordinarily, packaging something really small means quicker delivery to a customer. Well, when you're designing a virus, you take the same exact things into consideration, you want something that's really small and fast and easy to pass over packets over the internet. 

 

Then we get to the intermediate hybrid languages, which are compiled, but they've also interpreted languages like C sharp, and Java. And we get Apple's new wonderful, high-level protocol-oriented language Swift. 

And of course, this list wouldn't be complete without the high-level abstracted languages that basically everybody is learning and using right now for almost everything. 

These are designed for ease of use, but at the expense of control, like JavaScript, Python, Ruby, and so on. Don't get me wrong, these are still very powerful, real programming languages that can do some serious business. 

They're just not designed for low-level micro-controller engineering and programming. 

At the very top here we have HTML and CSS, which contrary to what many people will tell you are absolutely programming languages, they may not use logic to the same extent as a lower-level programming language. But effectively, they're designed for ease of use on the web. 

And they do meet every criteria to be considered a programming language, which is really just a set of instructions telling the computer what to do. 

In short, don't be a fool. Every language has its use, I just think C has the most uses. Some people obsess over what language to use for hacking. 

And although it is important, the operating system is just as important. Most hackers use Linux for good reason. Linux is highly modular and portable by nature. And it supports a vast array of tools for hackers. 

That probably helps if you're not yet familiar with the Linux operating system, that might be a good place to start before you get into programming. The biggest part of being a hacker isn't even knowing a programming language. 

But it's simply understanding how the systems work underneath the scenes, once you understand how things work below, you can break in from above, being a hacker is all about trial and error. 

Sometimes you have to try many things until you get something that works. And often you never do. But this process of trial and error is precisely why so many people love it. It's an incredibly rewarding experience. When you break code that somebody else has made. In many ways, it's competitive like a sport. 

Many people would think that hacking isn't that useful. But the truth is, it's fundamentally necessary to the electronic environment. If we didn't have white hat hackers, and even gray hat hackers, we wouldn't have the ability to defend ourselves against the black hat hackers. 

It's extremely important that every time you're on your phone and you take a selfie or picture, it's safeguarded. And only you can see it. Oh, yeah. Yeah, right there. Yeah, just like that. This is only possible because of the talent and amazing skills of ethical hackers. 

It's of my opinion that if you're new to programming, C is probably the best place to start. Not only is C cross-platform and used on almost every system in the world, but it's also the foundation of almost every programming language today, whether you go on to learn c++, swift, or Java, almost every modern language in the world is heavily influenced by C. 

Even JavaScript, which is now the most used and popular language in the world takes a huge amount of influence from C. That's why we refer to most languages as C style languages. C teaches you the foundations that you need to do whatever it is that you want to do. Hacking included. 

Most servers and systems today are designed on software that's written in modern languages, such as Java, and C sharp, but most of the microcontrollers and hardware running those systems and software are designed on C. 

So if you really want to get low and close to the hardware, C is the best place to be. Even if your goal is to be a general-purpose programmer. Learning C can look incredibly good on your resume, I highly suggest checking c out. 

And if it's not for you to try a different language, something higher level, we live in an age where the security of your information is more important than ever. As the world around us becomes more and more digitized. 

It's more important than ever to safeguard our information and identity. When we see hacks like the Equifax hack that have been recent, we know just how dangerous hackers can be from birth certificates to banking information and even your social security number. Black hat hackers are a reality of life. You cannot escape it. 

Where there is information. There are people trying to steal it. So the only way to control it is to fight fire with fire and find hackers that are willing to do it for ethical purposes. It's because of the hard work of ethical hackers that security measures are even possible to summarize, learn C. And if you can't learn Python or JavaScript,

All about hacking and cyber security I present ways of hacking over all platforms also trending news & info bugbounty tutorial for penetration testers

People are using smartphones more than ever and this trend isn't slowing down anytime soon whether you're new to smartphones or not you should know that they can be a huge target for hackers smartphones contain a lot of your personal information which can give someone else all they need to steal your identity or your digital data. 

    17 Tips To Secure Your Mobile Phone From Hackers

    Smartphone hacking is a profitable enterprise because hacking into smartphones is simple it's because it's so deserving your phone is an integral part of your life with so much anything before its passage into your phone is access into your mind.


    1.Strengthen your password

    Some of us might look back at the good old days when having a password was a few characters long it was easy to remember and you didn't need something that looked like it spilled out from the matrix unfortunately these days it's too easy to guess a standard password so it needs to be uncrackable here are some tips for making your password a little stronger.

    • combine old passwords with a  new one to get supercharged passwords you can add the name of your favorite animal or food with the year you first knew that add that on to the end of any password you already have to make your password uncrackable since most social media sites allow up to 15 characters for passwords keep your login original characters and numbers are fine but adding symbols and other special characters can really take your password up a notch.
     

    2.Device encryption


    This one is apparently authorized by default to double-check research for encrypt device in your Settings app and follow directions on the protection when more traditional Android gadgets you should have your gadgets charged and plugged in during encryption and set and remember password

    2.Device encryption
     

    You should additionally arrange for your device to delete all the data on your phone after too several improper tries this protects your device from facing brute-force attacks when somebody gets physical access encrypting your phone does not protect you from malware or remote exploitation device it only works if a phone gets stolen.



    3.Be smart on social media Sites

    Social isn't nearly as private or protected as you may think in the old days you could easily block people from looking at your information but with the size of Facebook, it's rare that your profile is truly private to maximize your safety always click the settings that only allow your friends and family to see your posts and pictures unless you know someone who wants to be your friend.

    Be cautious about accepting friend requests fake profiles can fool you into thinking you know that person a quick look at their friend list and recent posts tell you if they're active in a group or not look at a message to a friend requests with links that look and feel fishy some sneaky hackers can copy friends emails and send messages with link s hoping you'll press the link by the time you do you'll be suckered into giving up the info you didn't want to be stolen worse yet you could be locked out of your own profile account if they steal your password too so always be on the lookout for suspicious messages.

     

    4.Enable 2FA (Two Factor Authentication)


    Enabling 2FA can double your Security and if combine with a strong password Always Enable 2FA for your Social Media and Important sites so if your Password Gets compromised you have OTP to secure your account from hackers.
     

     

    5.Don't use open or Public  Wi-Fi


     Free High-speed WiFi is something that only a few can resist but this WiFi lurking with some very serious dangers you should need to aware of.

    5.Don't use open or Public  Wi-Fi

     

     Clicking on a link or popup from free WiFi can be very serious if a hacker is also using that WiFi he can hijack sessions of yours and do whatever he wants from your accounts. or use tools to find credentials

    This can be used as identity theft and your all information is being used by the wrong person. Disable your WiFi and network also for safety and use password of course.

    Using VPN and TOR can also work they hide your identity from ISP and Browsers


    6.Add more protection


    Just like your home computer you need a good firewall to protect your internet connection luckily new phones do a bit more than that every phone has its own firewall though you can always add more security apps to be double sure and this is a measure.

    Some apps work better for Android than they do for iPhone but there's plenty of software available a quick look through the Apple Store or Google Play app list will get you started some app names such as Norton, Avast and Mcfee are best.

    Using VPN services can also help here such as ProtonVPN and VPN Proxy Master which are the best VPN out there be sure to check out the links given to get 30 days free VPN for Desktop or mobile.

    It doesn't hurt to add this extra protection to your phones firewall apps protect you from select dangers to help keep your ID and info safe while others just target viruses when it comes to overall coverage find an app that offers complete packages choose what's best for you

    7.Add more protection


    7. Don't answer fishy and scammy unknown numbers


     The only scams we used to encounter were rudimentary email scams that were incredibly obvious who would fall for that these days well to say it's still happening to those who own a smartphone - 

    Did you ever get a missed call with an area code you don't recognize while most of these get blocked by your phone automatically some can slip through chances are if you call back that number you'll be sorry you did the trick to this is that your call is routed through an international premium rate number and can charge you way more than your monthly bill and it's more common than you think if you call back that number the cost of the call gets paid to the hackers these one-ring calls are the typical signs of this scam so you'll think you missed an important call don't be sucked into losing your money just erase or block the number you won't be called by that number ever again hopefully your smart phone will block other calls from that same area code as well. 

     

    8.Use cloud storage 

     cloud storage allows you to store important information and files in a location that's not on your phone this can be smart because it means the files aren't located on your phone if your phone is lost stolen or damaged you won't lose any of the data in cloud storage.

    Most importantly this means your information can be kept out of the hand of hackers cloud accounts are pretty hard to crack so even if you have an account on your device it'll be safe these accounts often have double password encryption so no login attempts are the same you might need a second login code sent to your mobile number to complete a cloud login this keeps hackers from getting the information you want to keep private while it might seem odd to put private information into cloud storage.

    10.Use cloud storage

    It's not such a bad idea having a mobile device clutter-free when you use it for business means you don't have to worry about misplacing files or running out of storage this also helps you travel light wherever you go and you won't have to worry about losing your pen drive that could fall into the wrong hands.

    Secure backup cloud and syncing if you're using backups or syncing make sure they are encrypted as well cloud backups are oftentimes an easy target to steal your private data secure your accounts with 2fa if you use Google Drive or iCloud your cloud backups use the same 2fa as your remained Google account or Apple ID connected to your phone if you decide to trust your default providers you're not in control of the security of your data  people holds or decryption keys and they can access your data in the iCloud  any time they want and I think only you should be able to decrypt your data crypto matter allows you to create encrypted vaults and automatically sync your secure backups to the cloud surveys of your choice if you don't pay for the service you are so I would recommend to go for next cloud you can  get between two to five gigabytes of cloud storage for free but it might not be enough for those of you taking plenty of high-resolution photos but next cloud is free and open-source and many providers even offer instant encryption  so this is the is the cloud service that  you should go for .


    9.Check app permissions 

    All apps of settings that allow app permissions tell the app what it can and can't do when it's connected to the Internet some of the common options include whether an app can access your photos contacts our camera and microphone.

     this is really important that you might not want your audio or visual gadgets to be used by other people these settings also control the amount of info given about your self and the information that's stored on your phone if these app settings are set up to your approval then you won't have to worry about that info being leaked often some hackers target certain apps that don't have secure internet connections your live images could be stolen through your phone or tablet and you never know where they could end up after that worse yet is that your
    private info can be sold to marketing agencies who will target you just from your mobile search history no it's not just Facebook that does it numerous third-party app pirates like to sell your private info too this can be avoided by checking your app permission settings on every app you decide to download.


    10.watch out for phishing apps 

    By now you have a good idea what phishing means and those who get hooked weren't being careful online game apps look attractive and have lots of flashy advertising which is a bit like a worm on a hook.

    12.watch out for phishing apps

     

    If you ever knew someone who likes sport fishing they use special bait to lure and catch their fish the same works for game apps that tempt you with flashy graphics before taking your information you'll know when you set these apps because they aren't on the official app sites such as Google Play or the Apple Store often they're traps that show up on rabbit-hole web sites.

    This is where you click on a link to a second web site which takes you through a string of different web sites you never actually get to the web site that you're looking for it can seem endless at times and this is where you start to see very familiar app game links these are usually copycat games that look just like the official ones but they're not they trick you into giving up all sorts of information to play the game they can also hack your phone giving them access to your private info for them to exploit don't ever fall for this kind of fishing bait.


    11.activate your phone's security features 


    New mobile devices give you lots of choices to protect you from getting hacked there isn't a smartphone out there today that doesn't have software filters that spot apps or files with dangerous malware.

     this is similar to software and computers which will prevent you from installing software that is detected to be unsafe antivirus blockers for apps that are easy to turn on inside your smartphone settings they're specifically designed to look for malware and app games if a game doesn't download chances are the app could be harmful to install.

    This is also great for kids who might not fully understand the apps they're clicking on or downloading once again if your device thinks it's not good for downloading you don't want to risk being hacked make sure you stick with official games that come from sources that have already screened their app games but even Google Play and Apple Store apps can have malware that's hidden somewhere so always activate your virus app blocker to be on the safe side.


    12.Go beyond passwords 


    Having your smartphone stolen is about the worst thing you can imagine then again if they can get into your phone because you don't have a password set up you're in real trouble, fortunately, there are some innovative things you can do to prevent thieves from getting your information too easily 

    New apps and models now allow fingerprint identification to unlock a phone for it to work you press a touch screen window holding your finger down if your print doesn't match the exact image that's stored in the phone's memory it won't open this can also be combined with a two-step process that uses a fingerprint and a password in addition you should also install a mobile tracker.
    this can be activated as soon as you notice your phone is missing an owner can then track their phone via the app and catch whoever is carrying your stolen goods some apps will even allow you to delete the info that's stored on the phone in an emergency but as long as you can get your phone back in one piece that's probably the best solution better call the police for help once you finally track down your phone.