What are the programming skills need a hacker?

In General interested in this subject and interested in the question which in the aggregate knowledge + skills need a hacker( pentester , IB).
Interested in exactly what you need to learn if you're going to write malware or other malware , you know what hackers are strong in reversing ,cryptography and languages with C like syntax.

Is there a concrete plan how to study languages ? Yet my understanding is the multiple paths of development
1. To purchase a course on the programming language and to begin to teach him or YouTube lessons
2. Read a few popular books on "JAPANESE"
3. After "Obtained Azov" , to write a few simple projects
4. Go to Githab and view the source code 'Malware' and to study and to adjust themselves under
This is my opinion. Interested in your! How did you study languages?

Interested in answers from people who do this, well, or those who "Fumbles"
P\S For clever answers like "Read the criminal code of the Russian Federation" - all have been read.
June 10th 19 at 14:41
10 answers
June 10th 19 at 14:43
Solution
First, this hacker without Assembler anywhere. So the first thing they teach assembler and understand the details of how to work iron. To practice is to write your basic operating system.

Second, learn C and understand how modern operating systems. Dig into the code of the Linux kernel and modules writing kernel mode.

Third, understand how the networks work. The whole Protocol stack, switching, routing. Try to write your server. Learn to read tcpdump on the fly and communicate with servers telnet'ohms.

And now, after a few years, you will be base enough to go to the hackers.
Nifiga , after a few years I understand 20 years? :D
Cho is difficult , to say asembler hard language - Lesley.Ruecker9 commented on June 10th 19 at 14:46
In General, in the post above all in the case, if you add this to my answer, it will be the perfect plan, the assembler is important although I would be a priority to him I would not give in the beginning, the same sisca allows you to work with iron, but what about picking your OS all right - Kassandra.Web commented on June 10th 19 at 14:49
one of the main tools a good hacker is reverse-engineering, and debuggers and disassembler code that do not show sesny. - samir39 commented on June 10th 19 at 14:52
firstly, hacking is the hardest part of it, requires a deep understanding of the technology. So, if you want to become a hacker, prepare to spend a lot of time and effort. Secondly, it is an endless process. The longer I study and practice, the more become a good hacker. Waste from the things, start to lag. Finally, the Assembler is quite the basics can be learned in a few months. - samir39 commented on June 10th 19 at 14:55
June 10th 19 at 14:45
I'm not a hacker but just a crappy coder, but I think that first you need to learn the basics of it security. Hacking is now like any work of not more than craft: dudes sit and develop software that is tested on internal servers. In real life, they did not Shine. Then sell on the darknet for good money. This software buys every shkolota and students ( who have wealthy parents of course), and then according to Nakatani - send to the appropriate organization is a Cossack, which in six months (maybe more maybe less) embeds into the inner system Trojan. Then it received its share of leaves, and scorotron cadet grandmother\valuable information and who need to sell. Themselves "hackers" , that is, the developers did to this action are not, and just sit(lie) in their rooms-offices-the hammocks on the beach, develop and test software. No there is no romance, revolution and guy Fawkes masks - just business and money.
Fit, but not all of these)) make a software for myself to milk money. - Lesley.Ruecker9 commented on June 10th 19 at 14:48
a lot of you know of? - Kassandra.Web commented on June 10th 19 at 14:51
enough) - samir39 commented on June 10th 19 at 14:54
you confuse my pentest, eth and that is hacking. If you want the money, the last and to do what is written in the post above. But let me remind you that this is not legal. And the question was, as it seemed to me, that's about pentasa - samir39 commented on June 10th 19 at 14:57
Well TK. this inter related, one legalno the other is not) - Lesley.Ruecker9 commented on June 10th 19 at 15:00
if you know them enough, then why ask the question here and not them?) Lol) - keara_Mosciski commented on June 10th 19 at 15:03
not quite true, because pentest a separate area with its sources of income and the ability to work for regular posts,eth is working on the cases of companies and most freelance or hack everything with writing then the owner of so so that discovered vulnerabilities,or correct let me correct for ODA cost.The hacking that you did the same but took a dB(say) to resell it to competitors or to the owner - Lesley.Ruecker9 commented on June 10th 19 at 15:06
don't listen to them. Doing the right thing. Rosary plan.

You only need a couple of points to add and a few to clean up. Here it is:
1. Cloak like in the matrix
2. And glasses. Also in the matrix.
3. Go to Githab and view the source code 'Malware' and to study and to adjust themselves under
4. Then come to a gathering of hackers, pass (show cloak and the code github) and receive the title of hacker.

Anyway, about the second point, I'm not 100% sure. In some cases you can skip. - Kassandra.Web commented on June 10th 19 at 15:09
June 10th 19 at 14:47
As for me, the study of third-party projects will have little effect.I would build a plan .
1.learning the basics of algoritmically ,there are excellent courses on coursera,minus that everything is in English.
2.The study protocols tls,ssh,http/s,s/mime, and so on.
3.The study of the foundations of the crypt(MB even under two cost to supply)
4.The study of Kali Linux and its application in pentest ,splnil the company pentestit ,if finances allow courses from him
5.Learning any scripting language Ala js
6. The study of si similar language to the level of operate protocols ( my opinion is that the IB most he uses Python and C++,but again the opinion of a person from a related field and more theoretical)
7.Writing applications for testing ,which use their well-known even closed the vulnerability
The plan was written about and from a person who is just sensitive fumbles,doubt,need links to courses and too lazy to Google can answer and sory for the grammar ,the tablet is evil - Lesley.Ruecker9 commented on June 10th 19 at 14:50
June 10th 19 at 14:49
Go to Githab and view the source code 'Malware' and to study and to adjust themselves under
this is a script kiddie

Read what all hackers do, and feel the difference.
Until you can put aside all the textbooks, and to read a few books about hackers. Not art bullshit, and books that the hackers wrote.

You can start with Kevin Mitnick - - "the Art of deception, Art of intrusion"

If you still want tutorials, start with the Tenenbaum "fundamentals of operating systems", "fundamentals of networking".

The language is parallel to learning a little, and do not care WHAT. If you decide to be a Hecker, in the end, will know more than a dozen languages. You can safely start with what is easier or what is a mentor near by.
About the script KIDI know) but it generally to know how the program works, the same botnet network , cryptory and so on. - Lesley.Ruecker9 commented on June 10th 19 at 14:52
June 10th 19 at 14:51
If you want to do online hacking, then install kali linux on dev and read docks on kali linux there is a lot of ready-to-use Internet vulnerabilities. And play in the pentest lab https://lab.pentestit.ru/ . Pentest lab is kind of an exercise in hacking the network. Every expert on Internet security must be able to pass it, otherwise he will not be able to protect yourself from this.
If you become an expert, register for https://www.hackerone.com/ is a resource where you pay for errors.

If you want to write cracks for programs, read articles from those who write cracks. The same DrMefisto https://habrahabr.ru/users/drmefisto/posts/ habré or crackme from anti-virus companies.

If you want to write backdoors and unlock for iphone and spying, then get to the FSB, because now these technologies are open almost ceased to spread. Because they can really earn a lot.
June 10th 19 at 14:53
I think we should study the criminal code and zanovsky Fenya
June 10th 19 at 14:55
Programming skills a hacker is not needed.
Do not need. Although their presence can be quite useful and facilitate the work.
Depends on what you "hacker", if you just want to drain money from the card, then Yes, there is knowledge of JAPANESE is not useful. - Lesley.Ruecker9 commented on June 10th 19 at 14:58
The question is not whether useful or not, and in fact necessary or not.
Theoretically, a hacker can take anything.

In General as far as I understand the hacker is the cracker - hacking requires knowledge of the system that are broken. Architecture, the device weaknesses - then we can find the vulnerability and hack the system.
Actually the hacking tools required - sometimes it is more convenient to write them yourself, there is no programming knowledge anywhere, and sometimes you can use existing tools, or to order the writing of the necessary software for the professional programmer. - Kassandra.Web commented on June 10th 19 at 15:01
Kali Linux uses only the known vulnerabilities, it is not a hacker , but rather pentester clean.If you want to look for something different, to find vulnerabilities in protocols which are unpublished, programming with low-level needs.Remember the story 2 months ago about the vulnerability of WPA-2 , purely on the Cali uzimati reply keys were Not visible,had to add their settings to the scripts. - samir39 commented on June 10th 19 at 15:04
June 10th 19 at 14:57
If you salieres to be a hacker in the field of it, for starters just the programming you need to master, and then hacking.
If you do not know how to write programs, even simple, how are you going to hack something, what do not understand?

Well, programming languages to learn is good, but the hack you're not a programming language, as a system, and therefore need to understand how it works. That is to learn the protocols, technologies and their stacks. For example, it is commonplace to find out exactly how http works and https, and how they differ.

Watch the movie "hackers", please note how many text books they mention how "it's something that everyone should know the hacker", that is, as the base, i.e. the "popular couple" is not even the beginning.
June 10th 19 at 14:59
And you are from a Department if not a secret?
You should at least clarify to whom is addressed question, I'm with the Department of cryptography in one of the Moscow universities - Lesley.Ruecker9 commented on June 10th 19 at 15:02
June 10th 19 at 15:01
Read books by Kris Kaspersky

Find more questions by tags HackingInformation security