What's new
Carding forum - Trusted Carding Forum - ATN card the World - Carding Forums - Carders Forums - Dread Forums.-

Welcome to legitcarding.net, your premier destination for all things carding! Dive into the world's top legit carding community, offering worldwide transfers via PayPal, Cashapp, Venmo, Western Union, and beyond. Gain access to credit card fullz, CC dumps, bank logs, and an array of premium services. Plus, enjoy complimentary gift cards and exclusive bonuses. Don't wait—unlock instant access now to scripts, carding guides, and more! Join us today and elevate your carding experience to new heights

hacking basic language b6y carding forum

Viper Carder

Legendary Vouched Carder♛
Staff member
Premium User
Support Staff
Verified Seller
♛ Forum Elite ♛
Registered
Joined
Feb 28, 2024
Messages
1,699
Reaction score
49
Points
48
Awards
3
C language : C is basic... Don't ask why. You are supposed to write programs while playing computer.

If you learn overflow, formatting: c, you can learn a hacking technique called buffer overflow and formatting. This is a technique that can be seen not only in c, but also in all other programming languages.

Linux: It's a similar operating system to Microsoft's Windows. It's a child operating system based on Unix. The commands are almost the same. First of all, it's free, it's stable.. So it's mainly used as a server. Linux and Yunix account for almost all of the server share. So, it's the most favorite operating system for hackers.
If you have time, let's study Windows Server...

Linux-related hacking technique: Race condition is a representative example. I haven't finished studying either..

ShellScript: Script is a program that is made mainly of convenience made of c or Java. Linux uses this shell. Think of it as a medium between the user and the kernel. It's shell because it looks like a shell. The reason you have to learn shell is because Linux works as a shell.

PearlScript: It's a language created by a programmer named Larry. The program is simple, so most of the hacking tools are made with this. Just by studying buffer overflow, you'll see why you have to learn pearls.

Python, Ruby: They are similar to PulseScript. There are some differences.

Data Structure: These are theories designed to make data processing more convenient and natural. To put it simply, arrangement is also a kind of data structure. It will be good to learn while studying programming. Stack, queue, and tree will be helpful when learning computer structure.

Socket: To put it simply, studying how to network for other computers and networks. It is usually taught based on c. There is a lot of content related to system programming.. It is useful to learn. Of course, it will also help you learn how to reverse later on.

Operating system: studying the structure in the operating system. It will be very helpful for hacking.

Comp structure: learn about the structure of a computer. come out memory theory, edian, etc. just a theoretical book. it's so hard.

Assembly: The computer only knows 0 and 1. If the program is written in c, the operating system makes itself binary and passes it to the computer.
Binary code is called machine language. The 0.1 machine language is made easier for humans to see.

Reversing: Curious why do you learn assembly? For reversing.. Usually, programs cannot see the source code (written code).
However, we can't hide the machine language. Do you understand why we need to know the assembly? We need to interpret the assembly and explain the structure of the code
Investigating vulnerabilities is called reverting (reverse engineering).

Advanced Techniques: If you study at this point, you can understand what you didn't understand even if you read the system hacking technique. If you cross Reversing, you can make shell codes
Reversing also allows you to spot vulnerabilities in the program and manipulate it at will.. will take a considerable amount of months.

Kernel: It's the core data of the operating system. If you study this kernel, you can hack the operating system itself, not the program.

Kernel hacking: Hacking the operating system itself.

Besides that,

Hardware: You need to know the theory to know how to hack the hardware itself.

(It will be hard to study here because of the theory of electronic engineering)

Hardware hacking: Of course, hardware is not actually hacked. But it can be manipulated at will
(Something like peeping on a laptop webcam..)
 
Back
Top