This is the question I have been asking many experienced programmers since I knew that a career in programming was the path I wanted to spend the rest of my life doing. Yet many expert/senior programmers always seem to give me the run around when asked the question. Like they don’t want me to figure out to become a great programmer and always have to come to them for answers.

There has been what, at least less then 10 people who have messaged me in an IRC chat room while I have been spamming the same question. While I have been flammed, spammed, and trolled for asking this question because I considered myself a hacker. Yet a hacker is someone who writes code and presents solutions to problems that wasn’t once there.

Here is my advice on how many hours a novice programmer should learn to write code and everything else that comes with programmer. I have done many endless nights of research on the topic and put all the answers together in my head. I have read countless amounts of forums, blogs and articles. Yet they all seem to say the same thing or not answer the questions at all, so here it goes.

If your looking to get into the world of programming, don’t sit around asking to many questions of how to. There are going to be people who will lead you on the wrong path since you didn’t take the time out to do your own research on the topic which is a major part in hacking/programming itself. What I have come to a understanding of is that you just have to do. Don’t sit and over think things, just pick a language, something you would like to master. Order a book from amazon or even goggle or piratebay  a free copy of the pdf. Who really cares. Then start reading, the book has all the answers you need to know.

You will not have a full understanding of the language as your going over the book. This is okay, there is no way your going to read a book of a language one time and just be able to speak it as well as you speak your native language. Although this will give you the ground work and some sort of understanding of what is going on. As you get deeper into the book, as in any book, you will start to grow a much higher understanding of what is going on. Being able to put the pieces to the puzzle together. Then this will make you think (Well what if this, was like this and what if that, was like that). This is good, this is the point you want to reach because now, instead of asking how to program your already starting to think how can you change and edit things to your own imagination. How can you own the piece of code your working on.

From this point you can do deeper into the subject. You can start going to websites like http://www.stackoverflow.com and http://www.reddit.com and start answer questions about programming that you once had. This should show you that you have some sort of understanding of what is going on to be able to even answer questions. IRC freenodee is another good place to visit to see and talk to more experienced programmers on questions or ideas you may even have.

Now that you have a basic understanding of programming, don’t go around bragging about how good you are because trust you don’t know enough. This is just your first language, the language you wish to master. So be humble and supply helpful feed back to other new comers to the programming world as you would want other people to.

Now back to the main question. How many hours should a novice programmer, program a day to become expert. Don’t let people confuse you with questions like, well what is expert and other blah blah bullshit. You will know when your expert when you can write code and explain it to someone. You will know when your a programmer when you can write code and not have to look at the textbook to remember anything because everything is already in your head.

So the answer I have come with to how many hours a novice should code a day is simple. Every waking moment of your life. If this is going to be your career, what you love and make a living off of at the same time. What else are you doing? There have been many nights for me while instead of coding, I was because thinking I wasn’t getting anywhere and spending endless nights asking the same questions over and over getting no where.

So do your research, look up jobs in the language you wish to master. See everything they want you know, it will mostly be about 3-4 languages and a framework. Learn all of these or at least have a understanding of the language to be able to edit the code. Then practice night and day, day and night. On average a full-time programmer works 40 hours a week. I am a full time student and unemployed, so once I finish homework, I have endless amounts of hours to do what ever I want. Even if you do work every waking moment your not at work code. So if a full-time programmer codes 40 hours a week, what do you think you should be doing to prepare for this position? That’s right you’ve guessed it code 40 hours a week. Even if you can at least 20 hours a day.

I have watched this guy on youtube sit and code for 12 hours. I was mind blown. I wanted to learn and grasp the mindset of being able to block out the world and just focus on what you love. The answer is simple, just do. Just read and write code everyday, not because you want some big salary, but simply because you love it. You have this mass thirst for knowledge and understanding that can’t be filled.

So for me I am trying to make it so I wake up in the morning, so a small work out, eat and then crack open the books and get right back to it. Don’t push it off for tomorrow in a hour, or any time later. You have nothing to lose and only everything to gain. If you want to become expert try to reach to 40 hour per week mark for the rest of your life and see how far it gets you!

The video of someone programming for 12 hours a day so whats your excuse?

Advertisements

Aside  —  Posted: October 22, 2012 in The Basics
Tags: , , , , , , , , , ,

Source: securityxploded.com/malware-analysis-training-reference

Here is the complete reference guide to all sessions of our Reverse Engineering & Malware Analysis Training program.

Part 1 – Lab Setup Guide
  1.  Virtualization:
    1. VmWare – http://www.vmware.com/
    2. VirtualBox – https://www.virtualbox.org/
  2.  Tools Development:
    1. Compilers/IDE:
      1. Dev C++ – http://www.bloodshed.net/devcpp.html
      2. Microsoft Visual C++ – http://www.microsoft.com/visualstudio/en-us/products/2010-editions/visual-cpp-express
    2.  Assemblers:
      1. MASM – http://www.masm32.com/
      2. NASM – http://www.nasm.us/
      3. WinAsm (IDE) – http://www.winasm.net/
    3. Langugages:
      1. Python – http://python.org/
  3. Tools Reverse Engineering:
    1. Disassembler:
      1. IDA (5.0) – http://www.hex-rays.com/products/ida/support/download.shtml
      2. IDAPython – http://code.google.com/p/idapython/
    2. Debuggers:
      1. OllyDbg – http://www.ollydbg.de/
      2. Immunity Debugger – http://immunityinc.com/products-immdbg.shtml
      3. Windbg – http://msdn.microsoft.com/en-us/windows/hardware/gg463009
      4. Pydbg – http://code.google.com/p/paimei/
    3. PE file Format:
      1. PEView – http://www.magma.ca/~wjr/
      2. PEBrowse – http://www.smidgeonsoft.prohosting.com/pebrowse-pro-file-viewer.html
      3. LordPE – http://www.woodmann.com/collaborative/tools/index.php/LordPE
      4. ImpRec – http://www.woodmann.com/collaborative/tools/index.php/ImpREC
      5. PEid – http://www.peid.info/ vi. ExeScan – http://securityxploded.com/exe-scan.php
    4. Process:
      1. ProcMon – http://technet.microsoft.com/en-us/sysinternals/bb896645
      2. Process Explorer – http://technet.microsoft.com/en-us/sysinternals/bb896653
    5. Network:
      1. WireShark – http://www.wireshark.org/
      2. TcpView – http://technet.microsoft.com/en-us/sysinternals/bb897437
    6. File and Registry:
      1. Regshot: http://sourceforge.net/projects/regshot/
      2. Capturebat – http://www.honeynet.org/node/315
      3. InstallWatchPro. – http://www.brothersoft.com/downloads/installwatch-pro-2.5c.html
      4. FileMon – http://technet.microsoft.com/en-us/sysinternals/bb896642
    7. Misc:
      1. CFFexplorer – http://www.ntcore.com/exsuite.php
      2. Notepad++ – http://notepad-plus-plus.org/
      3. Dependency walker – http://www.dependencywalker.com/
      4. Sysinternal Tools – http://technet.microsoft.com/en-us/sysinternals/bb842062
Part 2 – Introduction to Windows Internals
  1. Book: Windows Internals 5th Edition – Chapter 1, 2, 3, 5, 9
  2. Windows Architecture – http://technet.microsoft.com/en-us/library/cc768129.aspx
  3. Book: RootKit Arsenal – Part 1 – Windows System Architecture
  4. System Service Dispatching – http://www.codeproject.com/KB/system/hide-driver/NtCallScheme_small.png
Part 3 – Windows PE File Format Basics
  1. Portable Executable File Format – A Reverse Engineer View – Goppit – http://ivanlef0u.fr/repo/windoz/pe/CBM_1_2_2006_Goppit_PE_Format_Reverse_Engineer_View.pdf
  2. An In-Depth Look into the Win32 Portable Executable File Format by Matt Pietrek http://msdn.microsoft.com/en-us/magazine/cc301805.aspx
  3. Lena 151 tutorials – http://tuts4you.com/download.php?list.17
  4. Icezelion’s PE tutorials – http://win32assembly.online.fr/tutorials.html
Part 4 – Assembly Programming Basics
  1. Assembly Programming: A Beginners Guide – http://securityxploded.com/assembly-programming-beginners-guide.php
  2. Icezelion’s Win32 Assembly Programming Tutorials  – http://win32assembly.online.fr/tutorials.html
  3. Function Calling Convention Demystified – http://www.codeproject.com/KB/cpp/calling_conventions_demystified.aspx
  4. Intel Manual – Volume 2 (Instruction set), Volume 3 (system programming 3A) –
    http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-manual-325462.pdf
Part 5 – Reverse Engineering Tools Basics
  1. Video – Intro to OllyDbg and its Settings – http://www.youtube.com/watch?v=UqnQCVvYk3A
  2. Video – Intro to IDA Pro Disassembler – http://www.youtube.com/watch?v=zvWc-XsBKrA
  3. Automation of Reversing Through Scripting – http://securityxploded.com/automation-reversing-scripting.php
Part 6 – Practical Reversing (I)
  1. Video Demonstration – Reversing Sample Crackme using IDA Pro http://www.youtube.com/watch?v=6r5Q7YYnUSc
  2. Creating KEYGEN for Crackme Code http://securityxploded.com/creating-keygen-for-crackme.php
  3. Lena 151 tutorials – part1 to part 10 –http://tuts4you.com/download.php?list.17
  4. Book: ‘The IDA Pro Book’ – Unofficial Guide to IDA Pro http://www.amazon.com/The-IDA-Pro-Book-Disassembler/dp/1593272898
  5. Book: Practical Malware Analysis – chapter 1-7 http://www.amazon.com/Practical-Malware-Analysis-Dissecting-Malicious/dp/1593272901
  6. Book: Reversing – Secrets of Reverse Engineering – chapter 1,2,3,4,5,8 http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817
Part 7 – Practical Reversing II: Unpacking UPX
  1. Video Demonstration – Unpacking UPX using OllyDbg & ImpREC http://http://vimeo.com/42197903
  2. Manual Unpacking of UPX using OllyDbg http://securityxploded.com/unpackingupx.php
  3. UPX: Ultimate Packer for Executables http://upx.sourceforge.net/
  4. ImpREC: Import Table Reconstruction Tool http://securityxploded.net/download/Imprec.zip
  5. Best Unpacking Tutorials by ARTeam http://www.accessroot.com/
Part 8 – Practical Reversing III: Malware Memory Forensics
  1. Demo Video – http://www.youtube.com/watch?v=YcVusDjnBxw
  2. Malware Memory Forensics Article http://securityxploded.com/malware-memory-forensics.php
  3. Volatility – An advanced memory forensics framework http://code.google.com/p/volatility/
  4. Volatility – Volatile memory analysis research http://volatility.tumblr.com/
  5. MoonSols Windows Memory Toolkit http://www.moonsols.com/windows-memory-toolkit/
Part 9 – Practical Reversing IV: Advanced Malware Analysis
  1. Demo Video 1 – http://youtu.be/592uIELKUX8
  2. Demo Video 2 – http://youtu.be/3bxzvrGf5w8
  3. Volatility – An advanced memory forensics framework http://code.google.com/p/volatility/
  4. Volatility – Volatile memory analysis research http://volatility.tumblr.com/
  5. The Honeynet Project – http://www.honeynet.org/node/315
  6. Malware Analysis Tools & Training – http://zeltser.com/reverse-malware/
Part 10 – Practical Reversing V: Exploit Development Basics
  1. Demo Video 1 [EIP Overwrite]- http://www.youtube.com/watch?v=erl_Aee8oDg
  2. Demo Video 2 [SEH Exploitation]- http://www.youtube.com/watch?v=njQ47H7jO4s
  3. Remote Buffer Overflow Exploits – http://securityxploded.com/remote-buffer-overflow-exploits.php
  4. Exploit writing tutorials https://www.corelan.be/index.php/articles/
See Also

Source: programming-motherfucker.com

Programming, Motherfucker
Do you speak it?

We are a community of motherfucking programmers who have been humiliated by software development methodologies for years.

We are tired of XP, Scrum, Kanban, Waterfall, Software Craftsmanship (aka XP-Lite) and anything else getting in the way of…Programming, Motherfucker.

We are tired of being told we’re autistic idiots who need to be manipulated to work in a Forced Pair Programming chain gang without any time to be creative because none of the 10 managers on the project can do… Programming, Motherfucker.

We must destroy these methodologies that get in the way of…Programming, Motherfucker.
* * * *
Our Values
They Claim To Value They Really Value We Fucking Do
Individuals and interactions Tons of billable hours Programming, Motherfucker
Working software Tons of pointless tests Programming, Motherfucker
Customer collaboration Bleeding clients dry Programming, Motherfucker
Responding to change Instability and plausible deniability Programming, Motherfucker

We think the shit on the left, is really just the con in the middle, and that we really need to just do the thing on the right…Programming, Motherfucker.

Signed,

Zed A. Shaw
And The Programming Motherfuckers

Source: http://cyberwarzone.com

This list is an collection of cyberwarfare and cybercrime tools. Security tools that have been collected from the internet can be found here. They all have an legit and trusty source.

The tools that criminals use are mostly the same tools that security experts use to audit their systems. This goes the same for cyberwarfare and cybercrime tools. Cyberwarfare or hacktivism tools like DDOS scripts are used by pentesting experts to pentest and audit an environment.

Security tools like Firewall Analyzers and password cracking tools are needed to create and provide secure environments. This list offers an wide range of tools: real time protection tools, portable anti virus programs, anti rootkit tools, sniffing tools and several company provided tools.

Cyberwarzone has listed several cyber security tools to help you gain an better understanding of security.

Most of the products you can find for security are paid security solutions. Cyberwarzone has tried to collect tools that are being provided for FREE. So if you need an free cyber security tool then you are at the right address.

Security tools

You can find a lot of security tools on the internet. But it is hard to find the right tool for the right job. Here you will be able to download firewall analyzers and several security tools. Cyberwarzone has listed these tools for you.

If you believe we missed out on a security tool you can send us an message or simply post it as an comment.

Real time protection

Avast! Free
Ad-Aware Free
AVG Free
Panda Cloud Free
Avira free antivirus Free
Microsoft Security Essentials Free
Comodo Free
Fprot (with Returnil) Free
PC Tools Free Free
FortiClient Lite Free
Unthreat Antivirus Free
Preventon Free
Rising Free
Zillya! Free
NANO Free
Digital Defender Free
ClearSight Free
Zoner Free
BkavHome Free
CMC Infosec Free
Clam Sentinel Free
Moon Secure Free
ZenOK Free
Ainvo Antivirus Free

Portable anti-virus programs

DrWeb cureit
Emsisoft Emergency USB Stick files
Avira DE-Cleaner
Microsoft Safety Scanner
AVZ / AVZ database
Norman malware cleaner
Superantispyware
Panda ActiveScan Cleaner
Trendmicro Sysclean
NoVirusThanks
ArcaVir MicroScan
Zillya! Scanner
Spybot Portable
ClamWin Portable
Guardiano Assembler

Anti Root kit

TDSS Killer
Avast MBR Scanner
Gmer
RootRepeal
Kernel Detective
SpyDllRemover
VBA anti-rootkit
Sanity check
Rootkit Unhooker
Bitdefender Bootkit Removal Tool
RootkitRemover
mbr tool
catchme
Rootkitty
Kill bootkits
Hypersight Rootkit Detector
Rkdetector

Firewall analyzer

Security is effective when you know what is going on in your environment. The most of us protect ourselves with Firewalls, IDS, IPS and multiple monitor tools.

These devices and tools all create logfiles that can be analyzed to

Software Free / Paid Download link
Firemon Paid http://www.firemon.com
Barracudanetworks Paid http://www.barracudanetworks.com
Splunk Paid http://www.splunk.com

Monitor tools

If you want to monitor your environment you can use these monitor tools to find out what is happening in your environment.

Software FREE / Paid Download link
Zenoss Core Free http://community.zenoss.org/
NTA Monitor Free http://www.nta-monitor.com/tools/ike-scan/

Sniffers

Do you need to analyze an packet? You can use this packet analyzers to sniff packets that cross your network. You can analyze network problems, detect network intrusion attempts and more.

Software Free / Paid Download link
Wireshark Free http://www.wireshark.org
NMAP Free http://nmap.org/

Code Review Tools

Tools to review code.

Software Free / Paid Download link
Rough Auditing Tool for Security Free https://www.fortify.com

Config Review Tools

Tools to review config files.

Software Free / Paid Download link
Apache Benchmark Free http://www.cisecurity.org/
Microsoft Best Practice Analyzer Paid http://www.microsoft.com

Database Tools

Software Free / Paid Download link
SQL Server Express Utility Free http://www.microsoft.com
MySQL Command-Line Tool Free http://dev.mysql.com/
Leviathan Free http://leviathan.sourceforge.net/
WinSQL without installer Free http://web.synametrics.com/rawfiles.htm

Debugging Tools

Software Free / Paid Download link
OllyDbg Free http://www.ollydbg.de/
Free
Free
Free

Forensic Tools

Software Free / Paid Download link
Mandiant Red Curtain Free http://www.mandiant.com/
Mandiant Red Line Free http://www.mandiant.com/
Free
Free

Fuzzer Tools

Software Free / Paid Download link
Skipfish Free http://code.google.com/p/skipfish/
WSFuzzer Project Free https://www.owasp.org/
FileFuzz Free http://www.securiteam.com/tools
Fuzzdb Free http://code.google.com/p/fuzzdb/

SAP tools

Software Free / Paid Download link
SAPYTO Free http://www.security-database.com/

Backdoor Tools

Software Free / Paid Download link
TINI Free http://ntsecurity.nu/toolbox/tini/

Brute Force Tools

Software Free / Paid Download link
Hydra Brute Force Utility Free http://www.madirish.net/
BRUTUS Free http://www.hoobie.net/brutus/
TSGrinder Free http://www.hammerofgod.com/
Patator Free http://code.google.com/p/patator/

Truecrack Password cracking for truecrypt encrypted volume files click here

Interception Tools

Software Free / Paid Download link
Echomirage Free http://www.bindshell.net/tools/

Password Cracking Tools

Software Free / Paid Download link
Cain & Abel Free http://www.oxid.it/cain.html
John the Ripper Free http://www.openwall.com/john/
Ophcrack Free http://ophcrack.sourceforge.net/

Password Retrieval Tools

Have you lost your password and you need to retrieve your password? Then take a look at these password retrieval tools.

Software Free / Paid Download link
Creddump Free http://code.google.com/p/creddump/
FGdump Free http://www.foofus.net/~fizzgig/fgdump/
Pass-The-Hash toolkit Free http://oss.coresecurity.com/
PWdump Free http://www.foofus.net/~fizzgig/pwdump/

Token Impersionation Tools

Software Free / Paid Download link
Incognito Free http://sourceforge.net/projects/incognito/
Pass-The-Hash toolkit Free http://oss.coresecurity.com/
Windows Credentials Editor Free http://www.ampliasecurity.com/research.html

LIVE CD’s

Software Free / Paid Download link
Backtrack Free http://www.backtrack-linux.org/
Hiren Free http://www.hiren.info/pages/bootcd

Great Tool resources

Software Free / Paid Download link
HackArmoury Free http://hackarmoury.com/tools
Microsoft Free http://www.microsoft.com/download/
Phenoelit Free http://phenoelit.org/fr/tools.html
techsupportalert Free Massive tools list

Kaspersky Free Tools

Kaspersky Virus Removal Tool free Virus Removal Tool is a utility designed to remove all types of infections from your computer. It implies effective algorithms of detection used by Kaspersky Anti-Virus and AVZ. It cannot substitute a resident antivirus application.

http://www.kaspersky.com/antivirus-removal-tool-register

Kaspersky Rescue Disk 10 free Kaspersky Rescue Disk is designed to scan, disinfect and restore infected operating systems. It should be used when it is impossible to boot the operating system.

http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso

Kaspersky

Security Scan

free Kaspersky Security Scan provides a free-of-charge, easy way to find viruses and other threats that may be hidden on your PC… plus get advice on your PC’s security status.

http://products.kaspersky-labs.com/products/multilanguage/special/kss2/kss12.0.1.117mlg_en_ru_fr_de.exe

Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
33lz1vd

To use it, First install python 2.7 and download the last version of sqlmap-dev:
svn checkout https://svn.sqlmap.org/sqlmap/trunk/sqlmap sqlmap-dev

Then Download the file and unzip to sqlmap directory. For more help visit Official site.

Source: thehackernews.com#OpPedoChat

The hacktivist group Anonymous has launched a new action called Operation PedoChat ( #OpPedoChat ) to eliminate pedophile sites all over the world.

This is not the first time that Anonymous has gone after pedophiles in October of 2011 they went after sites operating inside the Tor network in Operation Darknet. They have announced this new Op in the usual manner through a YouTube video which announces the reasons and goals behind the operation.

Anonymous has called out their cry of Tango Down as they have removed several sites from the list. The group has also posted a large amount of data about members of these sites and posted them on pastebin.

Calling it #OpPedoChat, the video explains: “Recently it has come to our attention that there has been a surge of websites dedicated to paedophiles for chat and picture sharing. These paedophiles openly advocate concepts like “man-boy love”, stating that 8-year-old boys enjoy it and prey on their attention. This is not limited to boys, boards for little girls exist and operate with impunity. Child pornography is frequently traded and even innocent pictures of random children (at the beach, on a playground, in their homes) are publicly fantasised about.”

The operation started on 7 July and, despite some sites have already returned, 85 are still down. The posted information includes the details of hundreds of pedophiles (both users and administrators of these websites) as well as e-mails between them.

picture

Download: Hacking_For_Beginners_-_a_reference_book_for_beginners

Type:Other > E-booksFiles:1Size:11.45 MiB (12008206 Bytes)

Texted language(s):
English
Tag(s):
hacking tech hacking for beginners
Quality:
+1 / -0 (+1)
Uploaded:
2011-05-13 08:15:03 GMT
By:
manthan99
Seeders:
15
Leechers:
0
Comments
4