HOW TO BECOME A HACKER?
!!Alert!! hacking is a crime!
Hacker have deep knowledge of computer, server, programming language. An most important thing your mindset should be creative, and at least any one p
We are discuss the following point: -
1. What is hacking?
2. What is ethical hacking?
3. Who is hacker?
4. Types of hacker
10 steps to becoming an Ethical hacker
● How can be a hacker?
● Hacking techniques
● What is hacking?
Hacking is an art to exploiting the weakness of any network, website, application, computer etc. to gain access. Hacking is the unauthorised access to or control over computer network security systems for some illicit purpose. So, Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. The access to a password is obtained by the hacker through password cracking algorithms programs. Cracking is the term which means the method by which the password or code is obtained.
The hacking can be done on a website or a social media site or an email account, single systems, a group of systems, an entire LAN network.
The most of the individuals, as well as business associations, use computers and laptops for all their daily needs. Especially for organizations (of any form), it is essential to have a computer network, domain WAN for a seamless flow of information and business applications. Consequently, these networks are under a high-risk exposure to the outside world of hacking and hackers.
● What is ethical hacking?
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.
□ Get written permission from the owner of the computer system and/or computer network before hacking.
□ Protect the privacy of the organization been hacked.
□ Transparently report all the identified weaknesses in the computer system to the organization.
□ Inform hardware and software vendors of the identified weaknesses.
■ Who is hackers?
The person who undertakes hacking is known as the hacker. A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
■ Types of hacker: -
Mainly there are two types of hacker: -
○ White hat hacker
○ Black hat hacker
▪ Some of the another types of hacker are: ○ ○ Grey hat hacker
○ Script kiddies
○ Cracker
○ Scammer
○ Hactivist
○ Phreaker
■White hat hacker: -
White hat hacker is also known as Ethical hacker.
A hacker who gains access to systems with a view to fix the identified weaknesses.
They may also perform penetration Testing and vulnerability assessments.
■Black hat hacker: -
Black hat hacking is crime and the hacker who fall in this catogary is criminal (cyber criminal).
A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
■ Grey hat hacker: -
A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
■ Script kiddies: -
A non-skilled person who gains access to computer systems using already made tools.
■ Cracker: -
A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
■ Scammer: -
Scammer is a black hat hacker. someone who makes money using illegal methods, especially by tricking people is known as scammer.
■ Hacktivist: -
These hackers are those who are focussed on hacking websites and leaving contentious information on such websites. This is to spread political, social, religious messages. This can also take the form of targeting other nations.
■ Phreaker: -
A hacker who identifies and exploits weaknesses in telephones instead of computers. The word, which became popular in the mid-1980s, is probably a combination of the words phone and freak.
● 10_steps to becoming an Ethical hacker: -
- Basic knowledge of computer
- Operating system (A hacker should know more than one operating system)
- Cyber law
- Problem solving attitude
- Creative thinking
- CRYPTOGRAPHY_REVERSE_ENGINEERING
- Virtualization technology
- Programming language
- Networking
- Social engineering
■ How can be a hacker?
Install any operating system based on *nix family. (Delete windows, either it is genuine or not, it doesn’t matter)
First, it's not easy to be a hacker or security expert.
It's a long process and hard work of lots of years, it won’t come in just one night or one day or one month or even one year.
One must be a very passionate, curious and hard worker.
Learn to use Linux or Unix using Command-line Interface only (no GUI as there is no learning in GUI, if need GUI then use windows) and then after doing a lots of practice, learn Linux system administration.
Learn shell and python scripting language (useful in developing security tools and automating tasks)
Learn computer networking, Linux Networking Concepts which includes Wireless networking, protocols, OS/TCP-IP stack, IPTABLES, IDS/IPS, etc.
Learn NMAP Scripting Engine & Pentesting Tools (NMAP, Wireshark, aircrack suite etc.) and security framework 'Metasploit' and do lots of practice.
Try to get your hands dirty in Kali Linux but please, don’t limit yourself to only Kali Linux (because you can also do that with every distro of Linux family)
Learn server security hardening or learn to protect your servers, in other words, *nix security administration.
Must learn Programming languages like C/C++, ARM/x86/x64 assembly language, which helps in development (code and memory optimization), shellcode development, reversing malware, software and also in software exploitation).
Learn about socket programming in Python and C, both. It would be helpful in the development of backdoors and shellcodes.
Learn about operating system concepts, about Linux and BSDs and their security implementation on OS to make them secure.
Learn kernel programming which includes driver development from both, theoretical and practical point of view.
It would be little difficult to learn kernel programming as it requires one to be proficient in C, *nix system engineering (user-space development), some assembly language and all other operating system concepts.
In kernel programming one will learn more about the internals of os and kernel like how everything inside the kernel works.
Note:
Whatever stuff I have written here is more focussed on System and Network Security.
Please don't take it so easy,it requires a lot of hard work to be an independent security expert.
Do lots of research (or re-search on google) and learn by own. Don’t depend or wait for someone to teach or spoon-feed. Everyone is busy and struggling with their own problems in life.
Do a lot of practice on each and every point that mentioned above by setting up the virtual labs or in dockers or some sort of hardware, whatever suits.
Learn and read a lot of security technical books and also practice them a lot because technical books are not novels.
This post doesn’t cover mobile pentesting (user-space) and web pentesting. I am not the right person for web or on mobile pentesting yet but still mentioning some; like learning web development languages, learn about OWASP and also web-based attacks and try HackerOne or Bugcrowd to practice etc.)
For mobile pentesting like app reversing etc. one can proceed after learning the points mentioned above.
Requirements:
Google.
Curious Mind.
Patience .
Eagerness to Learn.
Constant and continous learning.
Get friendly with any LINUX operating system .
I recommend to use Kali Linux as it has 1000 of the tools preloaded in it. It is the mostly used OS used by the hackers for P*netration testing.The best thing about Kali Linux is it is free of cost open source and user-friendly.
2. Good Source for Learning
Hacking is not a small topic it is a vast topic so you have to find a good books which can solve your doubts.If you are a newbie, the book “Hacking Secrets Exposed” is a perfect source for learning.
3. Learn programming languages.
If you really want to start hacking like an Elite hacker then programming languages are important to know. If you have the knowledge about programming language then you can make your own tools and find out the bugs in any program. It is better to have some basic understanding of programming languages like Python,HTML PHP,JavaScript. It is good to start with HTML.
4. CEH [Certified Ethical Hacker] Certificate
Prepare for CEH certificate it is very valuable. For becoming a certified ethical hacker appropriate certification from International Council of Electronic Commerce Consultants (the EC-Council) is required. Certification requires that you have to pass a 4-hour exam, which contains 125 multiple-choice questions and the exam costs $500.
5. Conclusion
I will say you that for becoming a good ethical hacker you need to know your goals. Finding bugs and flaws is a difficult task. Try to track a single goal till accomplished before you move to next one. And in last don't waste your knowledge and become a Black hat hacker. Always work legally within the laws and use your knowledge to help others.
Thank you!!
!!Alert!! hacking is a crime!
Hacker have deep knowledge of computer, server, programming language. An most important thing your mindset should be creative, and at least any one p
We are discuss the following point: -
1. What is hacking?
2. What is ethical hacking?
3. Who is hacker?
4. Types of hacker
10 steps to becoming an Ethical hacker
● How can be a hacker?
● Hacking techniques
● What is hacking?
Hacking is an art to exploiting the weakness of any network, website, application, computer etc. to gain access. Hacking is the unauthorised access to or control over computer network security systems for some illicit purpose. So, Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. The access to a password is obtained by the hacker through password cracking algorithms programs. Cracking is the term which means the method by which the password or code is obtained.
The hacking can be done on a website or a social media site or an email account, single systems, a group of systems, an entire LAN network.
The most of the individuals, as well as business associations, use computers and laptops for all their daily needs. Especially for organizations (of any form), it is essential to have a computer network, domain WAN for a seamless flow of information and business applications. Consequently, these networks are under a high-risk exposure to the outside world of hacking and hackers.
● What is ethical hacking?
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.
□ Get written permission from the owner of the computer system and/or computer network before hacking.
□ Protect the privacy of the organization been hacked.
□ Transparently report all the identified weaknesses in the computer system to the organization.
□ Inform hardware and software vendors of the identified weaknesses.
■ Who is hackers?
The person who undertakes hacking is known as the hacker. A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
■ Types of hacker: -
Mainly there are two types of hacker: -
○ White hat hacker
○ Black hat hacker
▪ Some of the another types of hacker are: ○ ○ Grey hat hacker
○ Script kiddies
○ Cracker
○ Scammer
○ Hactivist
○ Phreaker
■White hat hacker: -
White hat hacker is also known as Ethical hacker.
A hacker who gains access to systems with a view to fix the identified weaknesses.
They may also perform penetration Testing and vulnerability assessments.
■Black hat hacker: -
Black hat hacking is crime and the hacker who fall in this catogary is criminal (cyber criminal).
A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
■ Grey hat hacker: -
A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
■ Script kiddies: -
A non-skilled person who gains access to computer systems using already made tools.
■ Cracker: -
A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
■ Scammer: -
Scammer is a black hat hacker. someone who makes money using illegal methods, especially by tricking people is known as scammer.
■ Hacktivist: -
These hackers are those who are focussed on hacking websites and leaving contentious information on such websites. This is to spread political, social, religious messages. This can also take the form of targeting other nations.
■ Phreaker: -
A hacker who identifies and exploits weaknesses in telephones instead of computers. The word, which became popular in the mid-1980s, is probably a combination of the words phone and freak.
● 10_steps to becoming an Ethical hacker: -
- Basic knowledge of computer
- Operating system (A hacker should know more than one operating system)
- Cyber law
- Problem solving attitude
- Creative thinking
- CRYPTOGRAPHY_REVERSE_ENGINEERING
- Virtualization technology
- Programming language
- Networking
- Social engineering
■ How can be a hacker?
Install any operating system based on *nix family. (Delete windows, either it is genuine or not, it doesn’t matter)
First, it's not easy to be a hacker or security expert.
It's a long process and hard work of lots of years, it won’t come in just one night or one day or one month or even one year.
One must be a very passionate, curious and hard worker.
Learn to use Linux or Unix using Command-line Interface only (no GUI as there is no learning in GUI, if need GUI then use windows) and then after doing a lots of practice, learn Linux system administration.
Learn shell and python scripting language (useful in developing security tools and automating tasks)
Learn computer networking, Linux Networking Concepts which includes Wireless networking, protocols, OS/TCP-IP stack, IPTABLES, IDS/IPS, etc.
Learn NMAP Scripting Engine & Pentesting Tools (NMAP, Wireshark, aircrack suite etc.) and security framework 'Metasploit' and do lots of practice.
Try to get your hands dirty in Kali Linux but please, don’t limit yourself to only Kali Linux (because you can also do that with every distro of Linux family)
Learn server security hardening or learn to protect your servers, in other words, *nix security administration.
Must learn Programming languages like C/C++, ARM/x86/x64 assembly language, which helps in development (code and memory optimization), shellcode development, reversing malware, software and also in software exploitation).
Learn about socket programming in Python and C, both. It would be helpful in the development of backdoors and shellcodes.
Learn about operating system concepts, about Linux and BSDs and their security implementation on OS to make them secure.
Learn kernel programming which includes driver development from both, theoretical and practical point of view.
It would be little difficult to learn kernel programming as it requires one to be proficient in C, *nix system engineering (user-space development), some assembly language and all other operating system concepts.
In kernel programming one will learn more about the internals of os and kernel like how everything inside the kernel works.
Note:
Whatever stuff I have written here is more focussed on System and Network Security.
Please don't take it so easy,it requires a lot of hard work to be an independent security expert.
Do lots of research (or re-search on google) and learn by own. Don’t depend or wait for someone to teach or spoon-feed. Everyone is busy and struggling with their own problems in life.
Do a lot of practice on each and every point that mentioned above by setting up the virtual labs or in dockers or some sort of hardware, whatever suits.
Learn and read a lot of security technical books and also practice them a lot because technical books are not novels.
This post doesn’t cover mobile pentesting (user-space) and web pentesting. I am not the right person for web or on mobile pentesting yet but still mentioning some; like learning web development languages, learn about OWASP and also web-based attacks and try HackerOne or Bugcrowd to practice etc.)
For mobile pentesting like app reversing etc. one can proceed after learning the points mentioned above.
Requirements:
Google.
Curious Mind.
Patience .
Eagerness to Learn.
Constant and continous learning.
Get friendly with any LINUX operating system .
I recommend to use Kali Linux as it has 1000 of the tools preloaded in it. It is the mostly used OS used by the hackers for P*netration testing.The best thing about Kali Linux is it is free of cost open source and user-friendly.
2. Good Source for Learning
Hacking is not a small topic it is a vast topic so you have to find a good books which can solve your doubts.If you are a newbie, the book “Hacking Secrets Exposed” is a perfect source for learning.
3. Learn programming languages.
If you really want to start hacking like an Elite hacker then programming languages are important to know. If you have the knowledge about programming language then you can make your own tools and find out the bugs in any program. It is better to have some basic understanding of programming languages like Python,HTML PHP,JavaScript. It is good to start with HTML.
4. CEH [Certified Ethical Hacker] Certificate
Prepare for CEH certificate it is very valuable. For becoming a certified ethical hacker appropriate certification from International Council of Electronic Commerce Consultants (the EC-Council) is required. Certification requires that you have to pass a 4-hour exam, which contains 125 multiple-choice questions and the exam costs $500.
5. Conclusion
I will say you that for becoming a good ethical hacker you need to know your goals. Finding bugs and flaws is a difficult task. Try to track a single goal till accomplished before you move to next one. And in last don't waste your knowledge and become a Black hat hacker. Always work legally within the laws and use your knowledge to help others.
Thank you!!
Free course:__★★★★
DOWNLOAD IN FREE FAST
● Hotstar
No comments:
Post a Comment
IF YOU HAVE HAVE ANY QUERY ABOUT MY POST THEN YOU CAN EMAIL SIMPLY ME :