Results 1 to 2 of 2

Thread: Steps in hacking an application Share/Save - My123World.Com!

  1. #1

    Question Steps in hacking an application

    Hi,
    Feels great to be a part of this awesome website.
    I'm a beginner, so, please bear with me.
    I am a high school student, a coder and a hacker.
    I have been hacking the web applications I make since about an year.


    I wanted to ask the geniuses and the pros, what are the steps involved in hacking any application. Of course, that depends on the application we are hacking, but, there are steps like, find flaws, carry out your exploit, et cetera.


    I am open to answers.
    Thanks.

  2. #2

    Lightbulb Here's my version

    Step 1: Identify the target and it's flaws. There are always flaws. This step requires a lot of arbitrary inputs providing.
    Step 2: Find the right exploit. Once you find the vulnerabilities, it's time to think of an exploit to use that vulnerability to suit your needs. To do or output what you desire.
    Step 3: Carry out the exploit. Loosely, launch the attack.
    Step 4: Sit back and see your will happening.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •