Nell’iperspazio con Rocket: il Framework Web di Rust!
Get started with hacking
1. How to get started with
Penetration testing aka hacking ;)
2. Hello, my name is Hamza Mirza. I’m a
cybersecurity enthusiast and a python
developer. In this article, I will explain where to
begin with pen testing, what are the essential
skills and how to approach them.
3. It is not an easy task to become a hacker. As a hacker, you need to have an
attitude and curiosity. Reading the hacking manifesto can teach you the
attitude of a hacker. Nurturing the hacker attitude is more about developing
competence in the languages rather than having a stereotypical attitude.
Though a lot of people consider that a hacker is a criminal, in real life, they are
hired by big companies for protecting information and minimizing potential
damage. The act of hacking actually is that of being over-curious and
outwitting authority.
The act of stealing something or doing harm to someone is not hacking. Such
people are commonly called crackers in the community. Crackers are involved
in illegal activities and I do not recommend you to get involved into such
activities.
5. Kali Linux to the rescue
Using Kali Linux is probably the easiest (and the shittiest) way of hacking.
If you post the question “How do I become a Hacker” in any forum on the internet, you can
be absolutely certain that someone will tell you to download and install Kali Linux (formerly
known as Backtrack) on your PC and then you are good to go.
Kali is a Linux Distribution with a lot of tools pre-installed and pre-configured. It’s a toolbox.
What you need to ask yourself is. “Would getting a brain surgeon’s toolbox make me a
brain surgeon?” No it wouldn't. Similarly, Kali Linux has been written by other hackers so
using the tools developed by other people makes you nothing but what’s known in the
hacker world as “Script Kiddies”. These people know nothing about hacking and have little
to knowledge of cyber security. So, I wouldn’t recommend using Kali Linux. In your early
days it’s ok to use Kali because it gives a ‘hacker feeling’ but you shouldn’t use it in the long
run.
Using the tools developed by other hackers is not only not going to get you anywhere, It’s
probably going to cause you problems because you really need to know how to install and
configure the tools yourself to be successful in hacking. How else will you handle the
moving on inside the system you have hacked when they don’t have Kali Linux in their
network?
6. Programming
This is one of the most important skills to have in order to become a Hacker. Everything you
see on your computer is already been programmed in some programming language. So, to
become a Computer Hacker, you must have a deep understanding of the programming
languages.
Start off with Python. It’s simple, it’s easy and it’s powerful. It’s great for tasks’ automation
and writing your own tools.
LEARN TO PROGRAM IN C!!!!
C is perhaps the most versatile programming language. If you can learn to program in C, you
can learn ANY programming language in the world. All operating systems are written in C, so
if you can program in C then you can easily write exploitation tools to hack into any OS. Be it
Windows, Linux or Mac OS X.
There are tons and tons of free C tutorials out there. I’d recommend “C programming –
thenewboston” on YouTube or any of C programming courses on Udemy. However, Udemy is
not entirely free, there are some free and some paid courses.
7. Networking Concepts
The networking concept needs to be sharp when you want to be a hacker.
Understanding how the networks are created is important, however, you need to know the
differences between different types are networks. Having a clear understanding of TCP/IP
and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.
Understand what is subnet, LAN, WAN and VPN.
The networking commands to do a HTTP request needs to be on your fingertips. The HTTP
protocol, is the gateway through which one enters the internet world. Hence, it is necessary
to learn this protocol in order to break the barriers. The hackers often use the HTTP
gateway to breach the security of the system and take control over it.
Learn how to use all this knowledge with a programming language. All In all, you really
need to have a deep understanding of TCP/IP, DNS, NAT, DNCP, Switching, Routers, Private
and Public IP, Mac address, subnetting, IPv4 and IPv6.
8. Learn LINUX
Fuck Windows. Seriously, fuck Windows.
The Windows operating system may be easy and convenient for most users, but it is
certainly not suited for hackers. With the exception of few windows only tools, most
hacking tools run best under Linux environment.
Linux is open-source and you’re less likely to get hit with firewalls.
However, I don’t recommend using Linux directly on your computer as a primary OS on
your hard disk (if you want to use it for hacking). Create a Linux live bootable USB or run
Linux on a Virtual Machine
9. Learn Cryptography
As an expert hacker, you need to understand and master the art of cryptography. The
technology of cryptography and encryption is very important for internet and
networking. It is the practice and study of techniques that are used for secure
communication in the presence of third parties. The encryption is done for various
aspects of information security such as confidentiality of the data, integrity of the data
and authentication. Moreover, the technology of cryptography is extensively used in ATM
cards, computer passwords and e-commerce. While hacking, these encrypted codes
needs to be broken, which is called decryption.
Cryptography is heavily used in SSL based internet communication. An expert hacker
should be able to understand how SSL works and what is the importance of cryptography
in keeping SSL secure.
Try reading about various encryption algorithms and see why they are difficult to
decrypt. Participate in challenges for decrypting a powerful encryption. An expert hacker
will be able to demonstrate weaknesses in a encryption algorithm and should be able to
write a program that can show how decryption can be performed without much
information about keys.
10. Staying anonymous
The most important thing for a hacker is to remain “anonymous” i.e when you will do any
illegal activities or even any ethical stuff you won’t be caught by cops.
Use a VPN or a proxy.
A VPN like hides your IP by connecting you to another server, a proxy actually does the
same!
You only have to use a VPN or Proxy when you’re doing your activities, after them, you
turn it off.
Let me explain it a bit. People will do everything to find you, so even a little mistake can
lead you to cops or you can be found! You have to put people on a dead track.
Whenever planning to do some hacking stuff you start your PC on with a proxy, and
then do you work and then turn off the proxy after completing the work and don’t
use the internet for 20-30 mins after that, you start it up without any proxy, and do
your legal normal things.