Chapter 5

How to Hack Computers


The term hacking is vague, but for the context of this book, we refer to the process as gaining illicit access to a computer or network. There are fundamentally two ways to hack a computer asset: to take advantage of poorly configured and maintained systems and to take advantage of vulnerabilities built into the software or hardware.

Security researchers have a place in this process by attempting to find unknown vulnerabilities in computer products. Proper cyber hygiene would prevent most hacking attempts; however, cyber hygiene is not properly implemented in most organizations.


Cross-site scripting; Hacking; Heartbleed; Security researchers; Software; Vulnerability life cycle; Vulnerabilities
This content ...

Get Advanced Persistent Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.