Hack With Shark
How to Become Ethical Hacker 2023 || Ethical Hacking Course For Beginners Free 2023
TABLE OF CONTENTS
- INTRODUCTION
- ESSENTIALS FOR A HACKER
- TYPES OF HACKING
- BEST HACKING TOOLS
- FOOTPRINTING
- USING VPN AND TOR
- MALWARE
- SOCIAL ENGINEERING
- SPY SOFTWARE
- OVERVIEW OF AUTOMATION INDUSTRY
- GAME HACKING
- ANDROID ROOTING
- SQL (STRUCTURED QUERY LANGUAGE)
- NETWORKING
- USEFUL LINKS
- ABOUT THE AUTHOR
2. ESSENTIALS FOR A HACKER
Step 1: Learn To Program In C
C programming being one of the most powerful languages in computer programming, It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT&T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic.
Step 2: Learn More Than One Programming Language
When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts. It will also help to know about markup languages like XML, HTML and data formats such as Json, Protobuf and others which are common way to transfer data between client and server.
Java is one of the most popular programming languages. It has been claimed that its also very secure. Knowing Java security model will empower you to understand how this language achieve security. Learn about the security loop. holes in Java language and related frameworks. Pick and read from many free PDF, tutorials and ebooks available to learn java online.
Perl is a general purpose dynamic programming language, which is high level and can be interpreted. This language borrows some features of C language. On the other hand, JAVA is concurrent, class based and objects oriented programming language. Python is really handy when you are trying to automate some repetitive tasks.
HTML is the mark up language based on which the web pages are designed, created and displayed. The web- browsers read the HTML code to display the web page.
Python is best language for web development and favorite language of an lot of programmer due to its simplicity and quick turn around. A lot of people use Python to do simple and complex automation.
Step 3: Learn UNIX
UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. The best way to learn it is to get into an open-source version (eg. centos) and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX.
If you have not used Unix operating system yet, an few essential linux commands will make your comfortable in getting quickly started.
A large number of web servers are hosted on Unix based servers and knowing internals of this operating system is going to be really a big boost in your skills.
Step 4: Learn More Than One Operating Systems
There are many other operating systems apart from UNIX Windows operating system is one of the most commonly compromised systems, hence it is good to learn hacking Microsoft systems, which are closed-source systems.
According to the National Vulnerability Database, Microsoft operating systems have a large number of vulnerabilities.
Windows OS installers are distributed in binary, therefore it is not easy for you to read the code. Binary code is the digital representation of text and data that computer understands However, knowing how programs are written for windows and how different applications behave on this operating system will help.
One of the recent vulnerabilities of a popular OS was that Java Web Start applications get launched automatically even if the Java plug-ins are disabled. Becoming a hacker is about knowing the weaknesses of these operating systems and targeting them systematically.
Step 5: Learn Networking Concepts
The networking concept needs to be sharp when you want to be a hacker.
Understanding how the networks are created is important, however you need to know the differences between different types are networks Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.
Understand what is subnet, LAN, WAN and VPN.
The networking commands to do an HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence it is necessary to learn this protocol in order to break the barriers. The hackers often use the HTTP gateway to breach the security of the system and take control over it.
Apache Http is one of the most commonly used web servers and knowing in and out of it is going to empower you on any HTTP or other application layer protocol related endeavors.
Nmap is a powerful network scanning tool that is used by hackers and security professional across the world to identify vulnerable hosts. However, to effectively start using it you must understand the networking basics. To get advanced skills on NMAP you can refer the book by creators - Nmap Network Scanning: The Official NMAP Project Guide to Network Discovery and Security Scanning
Step 6: Start Simple: Read Some Tutorials About Hacking
This is the simple and best way to start Read as many tutorials as possible that are meant for hacking. These articles will give you insight and help you develop the attitude to be a hacker. Some tutorials will initiate you with Nmap, Nessus and SuperScan, some of the hacking programs or tools that hackers generally use. These tutorials are readily available over the internet; Both text and video tutorials are available for you to answer your question how to be a hacker.
Step 7: Learn Cryptography
As an expert hacker, you need to understand and master the art of cryptography The technology of cryptography and encryption is very important for internet and networking.It is the practice and study of techniques that are used for secure communication in the presence of the third parties.The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentication.Moreover, the technology of cryptography is extensively used in ATM cards, computer passwords and e-commerce. While hacking these encrypted codes needs to be broken, which is called decryption.
Cryptography is heavily used in SSL based internet communication. A expert hacker should be able to understand how SSL works and what is the importance of cryptography in keeping SSL secure.
Understand various techniques used for password cracking. There are dozens of tools available to do password cracking, and using it is not hacking To be expert at hacking its important for you to understand how to create a program that can crack a password from cypher text.
Step 8: Experiment A Lot
This is an important step for setting yourself up as an expert hacker. Setup a laboratory on your own to experiment the learning on the practical applications. A simplest lab will have your computer, however once you advance you may want to add more and more computers and required hardware for your experiments.
It is good to try experimenting on your own computers, where you can rectify if you have done any mistake Many hackers initially start off by downloading virtual lab applications such as Oracle VirtualBox. You require at least 3 GBS of RAM and a comparatively powerful processor to carry out your hacking experiments. Setting up the virtual machine is crucial, as it will allow you to test virus, applications and different servers without affecting your own PC.
Some of the things you may need to keep in mind when doing experiments
- Keep a backup before any experiment.
- Start small and have check points.
- Know when to stop.
- Document your progress
- Keep improvising
- Automate repetitive tasks
Post a Comment
If you have any doubt, Please let me know.