• Welcome to the world's largest Chinese hacker forum

    Welcome to the world's largest Chinese hacker forum, our forum registration is open! You can now register for technical communication with us, this is a free and open to the world of the BBS, we founded the purpose for the study of network security, please don't release business of black/grey, or on the BBS posts, to seek help hacker if violations, we will permanently frozen your IP and account, thank you for your cooperation. Hacker attack and defense cracking or network Security

    business please click here: Creation Security  From CNHACKTEAM

Forums

  1. Network intelligence analysis threat detection

    1. News & Security threats

      As the network security situation becomes more and more complicated, the study of threat intelligence becomes more and more important. All parties involved in threat intelligence perception, sharing and analysis combine their own business processes and security requirements to enhance threat intelligence perception capabilities for core assets.

      201
      posts
  2. CHT Help Center

    1. CHT Help Center

      Here you can submit infiltration/reverse/crack/programming/hacking /CTF/ radio/hardware related topics for help, this section prohibits all advertising, black/grey production, if you violate our rules, we will put your account on the permanent suspended access list.

      201
      posts
  3. C19n37k Team

    1. system notice

      After entering the website, please click here to know the latest official announcement of our forum and the rules of using the website.

      31
      posts
    2. self-introduction

      After registration, new members will pass their information to other members, so that we can better communicate with each other.

      10
      posts
  4. Network technology research and learning

    1. Penetration testing

      对于 Window/ Solaris / AIX / Linux / Adroid / IOS/MS-SQL / Oracle / MySQL / DB2 / Access/WEB / 电子邮件 / 电子商务系统 / 路由器 / 交换机 / 防火墙 进行渗透入侵测试,达到知攻击,懂防御的目的。

      424
      posts
    2. Network technology

      This block contains any technical articles, you can publish here such as IP/NET network technology tutorials or WEB server security vulnerabilities/security project research /IOS Android development/scripting modules /Linux Windows tutorials/processor chips and more technical miscellaneous.

      8
      posts
    3. Vulnerability analysis

      Understand that hackers in all non-damaged state of the website, hardware, software, protocol implementation or system security policy on the defects of vulnerability mining, so that attackers can access or damage the system without authorization.

      106
      posts
    4. Trojan virus

      Analysis reports and solutions for system viruses, worms, Trojans, script viruses, macro viruses, backdoor viruses, virus planting program viruses, destructive program viruses, joke viruses, bundled encryption viruses, etc.

      34
      posts
    5. Capture The Flag

      In this section you can read technical articles on any attack and defense drill system, so that you can better learn penetration testing techniques.

      3
      posts
    6. Reverse engineering

      Reverse analysis of all kinds of system programs, get what you want in reverse, crack all kinds of difficult problems, and increase your skills.

      31
      posts
    7. Hacker Social Engineering

      Hacker social work attack is a way to gain their own interests by deception, injury and other harmful means against psychological traps such as psychological weakness, instinctive reaction, curiosity, trust and greed of the attacked.

      1
      post
    8. Cryptography/encryption/forensics/others

      Access to communications intelligence decryption & cryptography/forensics information, data recovery/malicious mail/computer systems, Linux, Windows, iOS, Android and other technical articles.

      1
      post
    9. Artificial intelligence (ai)

      Artificial Intelligence (Artificial Intelligence) is a new technical science that researches and develops theories, methods, technologies and application systems for simulating, extending and expanding human Intelligence.

      95
      posts
    10. Hardware/Iot security

      At present, the security of the Internet of Things project is mainly considered from six aspects: data confidentiality, data integrity, data freshness, availability, robustness and access control. Special reinforcement of these aspects is the main method to ensure the security of the Internet of Things.

      4
      posts
  5. Programming development

    1. 1,151
      posts
  6. C19n37K/CNHACKTEAM BBS

    1. 1
      post