This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - iHackiDevices

Pages: [1]
1
Hacking and Security / Re: Hey, IM LOST
« on: March 29, 2011, 10:58:05 PM »
Hahaha thank you both very much. I realize it is no easy task. And yeah I have started to read c books before. Any recommendations on any books? Also I have realized you can learn a lot from forums so I try to enroll myself in as many of these as I can. I downloaded hacking the art of exploitation version 2 on my iPad and also the C programming language by Ritchie and Kernighan. Thanks again for the help and any other information will be very much appreciated.

2
Hacking and Security / Re: Hey, IM LOST
« on: March 29, 2011, 01:05:34 AM »
I am also in the same boat. I am new to just about everything. Same grade level, and have an interest in hacking. From what I have read and taken from my readings Is that to be a hacker you should understand how the programs are written and how they work, in able to exploit them. I have began to read multiple books that explain programming, but from an advanced point of view even though it has said "beginner" right in the title. So, I decided to step down a notch and start completely from the beginning and read a book on Linux.. From things I have read online Linux is an operating system in which many people write their programs and then compile them, and is the closest operating system to the freedom and heart of hacking. I figure that it will get me familiar with some of the tools used by hackers. My interest in hacking started when I came upon the first iPhone jailbreak. I loved everything in it and what it could do. I thought to myself how far this could go. I then got into torrents and just figuring out ways to get around things. I used many different programs. But that's all I could use, programs. I began to wonder to myself HOW. How all of this was done. So mainly, my question is how do people such as Comex, geohot, muscle nerd and people like that do it with iOS jail breaking? What is it that they actually exploit in the software and how? Also, how do I build steps to get to even half of what they can do? Am I starting in the right place? What are the steps to get there? And Things like that.

Thank you.
Also, as you can see it is my first post , so please be easy on the criticism.   :)

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.