5 sites to learn how to ethically hack

If you are one and want to test your skills, check out these five sites that give you a sandbox to enter and try hacking them legally.

1. Google Gruyere
The Google Gruyere is Google's attempt to get into the world of hacking. The Google Gruyere website is full of holes and so is using it the word "Gruyer" (gruyere), which is a Swiss cheese. Even the website has a background with a wallpaper the cheese!

Once you get started, Google Gruyere will give you some challenges to run. It has a deliberately weak and vulnerable code to exploit. The problems underline these weak areas and give you a goal to accomplish.

If you are stuck on how to complete a challenge, don't worry. Each mission comes with some tips to help you move in the right direction. If you still can't move on, you can look at the solution and apply it yourself to get a sense of how this hack works.

2. HackThis
The site HackThis, is trying to give you a "real" mission.

Έχει μια μεγάλη ποικιλία προκλήσεων σε διαφορετικές κατηγορίες. Υπάρχουν θεμελιώδεις προκλήσεις και δύσκολες προκλήσεις για να δοκιμάσετε, ανάλογα με το επίπεδο δεξιοτήτων σας. Εάν θέλετε να δοκιμάσετε να απενεργοποιήσετε απλούς κώδικες , υπάρχει ένα ολόκληρο τμήμα για αυτό.

There is even a "real" category that includes fun fictional scenarios where you have to hack a website for your customer.

The best part about HackThis is the hints it offers. Each puzzle has a special tips page where you can talk to forum members and discuss where you are wrong. Members will never give you the solution so you can understand for yourself what you need to do.

3. bWAPP
While hacking sites are useful, there are some bugs and some exploits that they can't cover. For example, these sites may not ask you for challenges that would result in you downloading the site itself. If they did, no one else would be there later!

Therefore, it is best to attempt a destructive attack on your own server that you have created, so as not to damage other people's websites. If you are interested in this aspect of piracy, try it buggy web application (bWAPP).

Its main feature s bWAPP is the huge number of errors. It has over 100 bugs, ranging from DDoS vulnerabilities to Heartbleed vulnerabilities Bugs στο HTML5 ClickJacking. Αν θέλετε να μάθετε για μια συγκεκριμένη , υπάρχει μια καλή πιθανότητα να την βρείτε στο bWAPP.

When you want to try it, download it for free and run it on the target system. Once it runs, you can launch attacks without worrying about an annoying webmaster trying to stop you.

4. OverTheWire
The OverTheWire features wargames and warzones with the most advanced hacking attacks. Wargames are unique hacking scenarios, usually with little history, to be more plausible. Wargames can be a competitive event between hackers, either as a race or as an attacker on each other's servers.

Although this may sound complicated and scary, don't worry. The site still has lessons ranging from the basics to the most advanced tricks. It requires a Secure Shell (SSH) connection, so be sure to find out SSH if you want to try OverTheWire. Fortunately, there are easy ways to configure SSH in Windows, so it shouldn't be too big of an obstacle.

OverTheWire has three main uses. To begin with, you can play through small games with increasing difficulty to learn how to hack. Once you have some skill, you can download wargames with unique backstories for a more exciting experience.

There's also Warzone, which is a dedicated network, designed to work just like an Internet IPV4. Users can place sensitive devices on this network and others can use them to practice their piracy skills.

At the time of writing this article, there is an exercise that replicates his hack Kevin Mitnick at Tsutomu Shimomura, 1995. Now you can put yourself in Mitnik's position and see if you can break the safety yourself!

5. Hack This Site
Another site that invites you to is Hack This Site and is a great source of learning. It extends from beginner-oriented courses to dedicated phone line hosting for phreak attacks.

Some of the missions have a little story to keep you interested in the lessons. For example, users in the basic course will be introduced to Network Security Sam. Sam is a man who stubbornly refuses to save him on his website, so he is forced to remember him. But every time you crack its security and discover its code, it adds more security to its website.

"Realistic" exercises are also enjoyable. These are fake websites created to teach you to hack with a specific goal. They range from hitting a voting system to put someone first on the preference list or delete the of some spiritual people, such as poets, etc.

Each puzzle comes with a dedicated forum thread where you can get help. Problems and discussions have been around for a long time, and users have posted many useful ones . Again, no one will clearly tell you the solution to every challenge. But if you're willing to do some research, you'll find their tips quite helpful in solving the puzzle.

Do these sites promote illegal piracy?
As you browse through these websites, you may realize that various malicious people can use exactly the same, malicious skills. For example, some of the "realistic" missions are intended to break a library system or voting website for the best music band. It is easy to assume that these websites train the scammers to become better at their jobs.

The truth is, if these sites did not exist, hacker scammers could get relevant lessons and help from Dark web. Meanwhile, website developers, the people who need to learn hacking techniques to protect themselves, have a chance to learn and try these hacking techniques.

It's like a knife. In the hands of a surgeon he performs miracles, while in the hands of a robber he becomes a deadly tool. Therefore, by publishing this information, it gives developers the practice they need to secure their websites.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).