Related changes
Jump to navigation
Jump to search
Enter a page name to see changes on pages linked to or from that page. (To see members of a category, enter Category:Name of category). Changes to pages on your Watchlist are in bold.
List of abbreviations:
- N
- This edit created a new page (also see list of new pages)
- m
- This is a minor edit
- b
- This edit was performed by a bot
- (±123)
- The page size changed by this number of bytes
16 May 2025
23:07 | Information Gathering diffhist +246 Vegard talk contribs |
|
21:33 | Basic Linux Commands 3 changes history +2,341 [Vegard (3×)] | |||
|
21:33 (cur | prev) +1,886 Vegard talk contribs (→Examples) | ||||
|
21:29 (cur | prev) +340 Vegard talk contribs (→Navigation & File Management) | ||||
|
21:28 (cur | prev) +115 Vegard talk contribs (→Navigation & File Management) |
N 21:18 | Can hacking be learned? diffhist +1,431 Vegard talk contribs (Created page with "= Can Hacking Be Learned? = Hacking is a discipline that builds on structured knowledge, practical skills, and analytical thinking. It involves understanding how systems operate, how information flows, and how logic governs digital environments. Like any technical field, hacking follows principles that can be studied, practiced, and refined over time. Learning to hack involves both theoretical foundations and hands-on experience. Core concepts include system architectu...") |
N 21:16 | What tools do hackers use? diffhist +1,765 Vegard talk contribs (Created page with "= What Tools Do Hackers Use? = Hackers use a wide range of tools designed to analyze, manipulate, and interact with digital systems. These tools support various phases of hacking, including information gathering, vulnerability discovery, exploitation, privilege escalation, and persistence. Reconnaissance tools assist in collecting data about systems, networks, or users. This information helps form a clearer understanding of the target environment, revealing potential e...") |
N 21:12 | What are the types of hackers? diffhist +2,271 Vegard talk contribs (Created page with "= What Are the Types of Hackers? = Hackers are often categorized based on their intent, methods, and objectives. These categories help describe how individuals interact with digital systems and what outcomes they pursue. While the term "hacker" broadly refers to someone skilled in navigating and manipulating technology, distinctions arise from context and purpose. == White Hat == White hat hackers work with permission to identify and resolve security issues. Their acti...") |
N 21:09 | What makes hacking ethical? diffhist +1,439 Vegard talk contribs (Created page with "= What Makes Hacking Ethical? = Ethical hacking is defined by intention, consent, transparency, and respect for boundaries. It occurs when individuals use their technical skills to identify vulnerabilities, improve security, or support system resilience with the knowledge and approval of the system owner. Clear authorization is central to ethical hacking. When a system owner grants permission to examine digital infrastructure, the hacker operates within a structured ag...") |
N 21:07 | When does hacking become illegal? diffhist +1,552 Vegard talk contribs (Created page with "= When Does Hacking Become Illegal? = Hacking becomes subject to legal frameworks when actions involve unauthorized access, data manipulation, or disruption of services within systems protected by law. Legal definitions vary by jurisdiction, but common factors include intent, consent, and the impact of the activity on system integrity, confidentiality, or availability. In many legal systems, accessing a system without explicit permission is addressed through statutes r...") |
N 21:05 | Who becomes a hacker? diffhist +1,313 Vegard talk contribs (Created page with "= Who Becomes a Hacker? = A hacker is someone who develops the ability to understand, modify, or interact with systems in creative and unconventional ways. Individuals who become hackers often possess a strong curiosity for how things work, a desire to solve complex problems, and an interest in exploring the boundaries of technology. Hackers emerge from diverse backgrounds. Some gain early exposure to computers, networks, or code through self-initiated experimentation....") |
N 21:03 | Where does hacking happen? diffhist +1,610 Vegard talk contribs (Created page with "= Where Does Hacking Happen? = Hacking takes place across digital environments where information systems, networks, or software interact. These environments include public and private infrastructures, internet-connected devices, corporate systems, personal computers, and embedded platforms. Each environment presents different surfaces for exploration, depending on its structure, purpose, and exposure. In many cases, hacking occurs remotely through the internet. This in...") |
N 21:01 | Why do people hack? diffhist +1,595 Vegard talk contribs (Created page with "= Why Do People Hack? = People engage in hacking for a variety of reasons, often shaped by personal interests, technical curiosity, or broader motivations related to access, control, or influence. The act of hacking reflects an interaction between the individual and the system, where knowledge and action converge to create a specific outcome. Some view hacking as a challenge — a way to test the boundaries of technology and explore hidden mechanics. Others pursue it a...") |
N 20:58 | How is hacking done? diffhist +1,695 Vegard talk contribs (Created page with "= How is Hacking Done? = Hacking is carried out through a sequence of steps that involve reconnaissance, analysis, and system interaction. These actions are based on logic, precision, and an understanding of how digital systems function. The process begins by identifying a target system or component, followed by studying its behavior, structure, and surface-level responses. One common approach involves mapping exposed services or interfaces. This provides insight into...") |
N 20:53 | What is hacking? diffhist +1,484 Vegard talk contribs (Created page with "= What is Hacking? = '''Hacking''' is the practice of exploring, understanding, and manipulating computer systems, networks, or digital technologies in ways that exceed or transcend their intended design. It involves deep knowledge of system internals, creative problem-solving, and an ability to see patterns, flaws, and logic beyond the surface. The concept originated in early computing cultures where individuals sought to push machines to their limits. Over time, hack...") |
13 May 2025
|
09:20 | Basic Linux Commands 7 changes history +10,653 [Vegard (7×)] | |||
|
09:20 (cur | prev) +4,981 Vegard talk contribs | ||||
|
09:06 (cur | prev) +724 Vegard talk contribs (→Linux Commands) | ||||
|
09:04 (cur | prev) +1,141 Vegard talk contribs (→Navigation & File Management) | ||||
|
09:02 (cur | prev) +1,141 Vegard talk contribs (→Viewing & Text Processing) | ||||
|
09:01 (cur | prev) +1,107 Vegard talk contribs (→System & User Info) | ||||
|
08:59 (cur | prev) +4 Vegard talk contribs | ||||
|
08:56 (cur | prev) +1,555 Vegard talk contribs |
12 May 2025
|
N 19:12 | Basic Linux Commands 6 changes history +6,307 [Vegard (6×)] | |||
|
19:12 (cur | prev) +45 Vegard talk contribs (→Common Commands) | ||||
|
18:51 (cur | prev) +290 Vegard talk contribs | ||||
|
18:46 (cur | prev) +494 Vegard talk contribs | ||||
|
18:06 (cur | prev) −162 Vegard talk contribs | ||||
|
15:38 (cur | prev) +2,192 Vegard talk contribs | ||||
N |
|
15:34 (cur | prev) +3,448 Vegard talk contribs (Created page with "= Linux Commands = '''Linux command-line tools''' are the building blocks of interaction, enumeration, file manipulation, and system control during any hacking operation. This page breaks down commonly used Linux commands, their usage, categories, and real-world hacking relevance. == <span id="basics"></span>Essential Commands == === Navigation === {| class="wikitable" ! Command !! Description !! Example |- | <code>pwd</code> || Show current working directory || <code...") |
11 May 2025
|
N 13:56 | Information Gathering 4 changes history +2,225 [84.211.245.84 (4×)] | |||
|
13:56 (cur | prev) −195 84.211.245.84 talk | ||||
|
13:42 (cur | prev) +1,327 84.211.245.84 talk | ||||
|
13:41 (cur | prev) −171 84.211.245.84 talk | ||||
N |
|
13:40 (cur | prev) +1,264 84.211.245.84 talk (Created page with "[title]Information Gathering[/title] [txt] Information gathering is the initial phase of hacking and reconnaissance. It involves discovering the attack surface, identifying reachable hosts, and understanding the target environment — all without yet exploiting anything. This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data. Explore the key categories below: [/txt] [list] [li]DNS Reconnaissance...") Tag: Visual edit: Switched |