Chapter 5

How to Hack Computers


The term hacking is vague, but for the context of this book, we refer to the process as gaining illicit access to a computer or network. There are fundamentally two ways to hack a computer asset: to take advantage of poorly configured and maintained systems and to take advantage of vulnerabilities built into the software or hardware.

Security researchers have a place in this process by attempting to find unknown vulnerabilities in computer products. Proper cyber hygiene would prevent most hacking attempts; however, cyber hygiene is not properly implemented in most organizations.


Cross-site scripting; Hacking; Heartbleed; Security researchers; Software; Vulnerability life cycle; Vulnerabilities
This content ...

Get Advanced Persistent Security now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.