SlideShare ist ein Scribd-Unternehmen logo
1 von 10
How to get started with
Penetration testing aka hacking ;)
Hello, my name is Hamza Mirza. I’m a
cybersecurity enthusiast and a python
developer. In this article, I will explain where to
begin with pen testing, what are the essential
skills and how to approach them.
It is not an easy task to become a hacker. As a hacker, you need to have an
attitude and curiosity. Reading the hacking manifesto can teach you the
attitude of a hacker. Nurturing the hacker attitude is more about developing
competence in the languages rather than having a stereotypical attitude.
Though a lot of people consider that a hacker is a criminal, in real life, they are
hired by big companies for protecting information and minimizing potential
damage. The act of hacking actually is that of being over-curious and
outwitting authority.
The act of stealing something or doing harm to someone is not hacking. Such
people are commonly called crackers in the community. Crackers are involved
in illegal activities and I do not recommend you to get involved into such
activities.
Let’s get started!
Kali Linux to the rescue
Using Kali Linux is probably the easiest (and the shittiest) way of hacking.
If you post the question “How do I become a Hacker” in any forum on the internet, you can
be absolutely certain that someone will tell you to download and install Kali Linux (formerly
known as Backtrack) on your PC and then you are good to go.
Kali is a Linux Distribution with a lot of tools pre-installed and pre-configured. It’s a toolbox.
What you need to ask yourself is. “Would getting a brain surgeon’s toolbox make me a
brain surgeon?” No it wouldn't. Similarly, Kali Linux has been written by other hackers so
using the tools developed by other people makes you nothing but what’s known in the
hacker world as “Script Kiddies”. These people know nothing about hacking and have little
to knowledge of cyber security. So, I wouldn’t recommend using Kali Linux. In your early
days it’s ok to use Kali because it gives a ‘hacker feeling’ but you shouldn’t use it in the long
run.
Using the tools developed by other hackers is not only not going to get you anywhere, It’s
probably going to cause you problems because you really need to know how to install and
configure the tools yourself to be successful in hacking. How else will you handle the
moving on inside the system you have hacked when they don’t have Kali Linux in their
network?
Programming
This is one of the most important skills to have in order to become a Hacker. Everything you
see on your computer is already been programmed in some programming language. So, to
become a Computer Hacker, you must have a deep understanding of the programming
languages.
Start off with Python. It’s simple, it’s easy and it’s powerful. It’s great for tasks’ automation
and writing your own tools.
LEARN TO PROGRAM IN C!!!!
C is perhaps the most versatile programming language. If you can learn to program in C, you
can learn ANY programming language in the world. All operating systems are written in C, so
if you can program in C then you can easily write exploitation tools to hack into any OS. Be it
Windows, Linux or Mac OS X.
There are tons and tons of free C tutorials out there. I’d recommend “C programming –
thenewboston” on YouTube or any of C programming courses on Udemy. However, Udemy is
not entirely free, there are some free and some paid courses.
Networking Concepts
The networking concept needs to be sharp when you want to be a hacker.
Understanding how the networks are created is important, however, you need to know the
differences between different types are networks. Having a clear understanding of TCP/IP
and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.
Understand what is subnet, LAN, WAN and VPN.
The networking commands to do a HTTP request needs to be on your fingertips. The HTTP
protocol, is the gateway through which one enters the internet world. Hence, it is necessary
to learn this protocol in order to break the barriers. The hackers often use the HTTP
gateway to breach the security of the system and take control over it.
Learn how to use all this knowledge with a programming language. All In all, you really
need to have a deep understanding of TCP/IP, DNS, NAT, DNCP, Switching, Routers, Private
and Public IP, Mac address, subnetting, IPv4 and IPv6.
Learn LINUX
Fuck Windows. Seriously, fuck Windows.
The Windows operating system may be easy and convenient for most users, but it is
certainly not suited for hackers. With the exception of few windows only tools, most
hacking tools run best under Linux environment.
Linux is open-source and you’re less likely to get hit with firewalls.
However, I don’t recommend using Linux directly on your computer as a primary OS on
your hard disk (if you want to use it for hacking). Create a Linux live bootable USB or run
Linux on a Virtual Machine
Learn Cryptography
As an expert hacker, you need to understand and master the art of cryptography. The
technology of cryptography and encryption is very important for internet and
networking. It is the practice and study of techniques that are used for secure
communication in the presence of third parties. The encryption is done for various
aspects of information security such as confidentiality of the data, integrity of the data
and authentication. Moreover, the technology of cryptography is extensively used in ATM
cards, computer passwords and e-commerce. While hacking, these encrypted codes
needs to be broken, which is called decryption.
Cryptography is heavily used in SSL based internet communication. An expert hacker
should be able to understand how SSL works and what is the importance of cryptography
in keeping SSL secure.
Try reading about various encryption algorithms and see why they are difficult to
decrypt. Participate in challenges for decrypting a powerful encryption. An expert hacker
will be able to demonstrate weaknesses in a encryption algorithm and should be able to
write a program that can show how decryption can be performed without much
information about keys.
Staying anonymous
The most important thing for a hacker is to remain “anonymous” i.e when you will do any
illegal activities or even any ethical stuff you won’t be caught by cops.
Use a VPN or a proxy.
A VPN like hides your IP by connecting you to another server, a proxy actually does the
same!
You only have to use a VPN or Proxy when you’re doing your activities, after them, you
turn it off.
Let me explain it a bit. People will do everything to find you, so even a little mistake can
lead you to cops or you can be found! You have to put people on a dead track.
Whenever planning to do some hacking stuff you start your PC on with a proxy, and
then do you work and then turn off the proxy after completing the work and don’t
use the internet for 20-30 mins after that, you start it up without any proxy, and do
your legal normal things.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to python for cybersecurity pythonminna
Introduction to python for cybersecurity  pythonminnaIntroduction to python for cybersecurity  pythonminna
Introduction to python for cybersecurity pythonminnaTopeAbdulgafar
 
Open stack security emea launch
Open stack security   emea launchOpen stack security   emea launch
Open stack security emea launchJoshua McKenty
 
Client side encryption without knowing its limits is a ticking time bomb!
Client side encryption without knowing  its limits is a ticking time bomb!Client side encryption without knowing  its limits is a ticking time bomb!
Client side encryption without knowing its limits is a ticking time bomb!Priyanka Aash
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Frode Hommedal
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLexume1
 
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018Codemotion
 
Enabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responseEnabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responsejeffmcjunkin
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Tanja Drca
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 

Was ist angesagt? (17)

Introduction to python for cybersecurity pythonminna
Introduction to python for cybersecurity  pythonminnaIntroduction to python for cybersecurity  pythonminna
Introduction to python for cybersecurity pythonminna
 
Open stack security emea launch
Open stack security   emea launchOpen stack security   emea launch
Open stack security emea launch
 
Steganography
SteganographySteganography
Steganography
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Client side encryption without knowing its limits is a ticking time bomb!
Client side encryption without knowing  its limits is a ticking time bomb!Client side encryption without knowing  its limits is a ticking time bomb!
Client side encryption without knowing its limits is a ticking time bomb!
 
Eng12
Eng12Eng12
Eng12
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)
 
Password Attack
Password Attack Password Attack
Password Attack
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
 
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
 
Enabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responseEnabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident response
 
Cyber security
Cyber security Cyber security
Cyber security
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 

Ähnlich wie Get started with hacking

How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosOuthai SAIOUDOM
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfxererenhosdominaram
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersJahaSoft
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxYashSomalkar
 
Paper id 311201535
Paper id 311201535Paper id 311201535
Paper id 311201535IJRAT
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book MiniKhairi Aiman
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Future Insights
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfIndianArmy38
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfIndianArmy38
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWCyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWChanchalHiwanj1
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: HackingQhaiyum Shah
 
What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?Careervira
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?Srashti Jain
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecYashSomalkar
 

Ähnlich wie Get started with hacking (20)

How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie Hackers
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
 
Paper id 311201535
Paper id 311201535Paper id 311201535
Paper id 311201535
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book Mini
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWCyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
 

Mehr von Ham'zzah Mir-zza (20)

Activating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license keyActivating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license key
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
Hacking tutorial.
Hacking tutorial.Hacking tutorial.
Hacking tutorial.
 
E6 logo Animation
E6 logo Animation E6 logo Animation
E6 logo Animation
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist - E6 3D Logo
Ethical Checklist - E6 3D LogoEthical Checklist - E6 3D Logo
Ethical Checklist - E6 3D Logo
 
Production
ProductionProduction
Production
 
Final schedule 1
Final schedule 1Final schedule 1
Final schedule 1
 
Final schedule
Final scheduleFinal schedule
Final schedule
 
Final production log
Final production logFinal production log
Final production log
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 
3 d animation
3 d animation3 d animation
3 d animation
 
Gd02 collaboration agreement
Gd02 collaboration agreementGd02 collaboration agreement
Gd02 collaboration agreement
 
Project Charter
Project CharterProject Charter
Project Charter
 
Gd02 ethical checklist (1)
Gd02 ethical checklist (1)Gd02 ethical checklist (1)
Gd02 ethical checklist (1)
 
Pixel and resolution
Pixel and resolutionPixel and resolution
Pixel and resolution
 
Review
ReviewReview
Review
 
Figurative artists
Figurative artistsFigurative artists
Figurative artists
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 

Kürzlich hochgeladen

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Get started with hacking

  • 1. How to get started with Penetration testing aka hacking ;)
  • 2. Hello, my name is Hamza Mirza. I’m a cybersecurity enthusiast and a python developer. In this article, I will explain where to begin with pen testing, what are the essential skills and how to approach them.
  • 3. It is not an easy task to become a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude. Though a lot of people consider that a hacker is a criminal, in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and I do not recommend you to get involved into such activities.
  • 5. Kali Linux to the rescue Using Kali Linux is probably the easiest (and the shittiest) way of hacking. If you post the question “How do I become a Hacker” in any forum on the internet, you can be absolutely certain that someone will tell you to download and install Kali Linux (formerly known as Backtrack) on your PC and then you are good to go. Kali is a Linux Distribution with a lot of tools pre-installed and pre-configured. It’s a toolbox. What you need to ask yourself is. “Would getting a brain surgeon’s toolbox make me a brain surgeon?” No it wouldn't. Similarly, Kali Linux has been written by other hackers so using the tools developed by other people makes you nothing but what’s known in the hacker world as “Script Kiddies”. These people know nothing about hacking and have little to knowledge of cyber security. So, I wouldn’t recommend using Kali Linux. In your early days it’s ok to use Kali because it gives a ‘hacker feeling’ but you shouldn’t use it in the long run. Using the tools developed by other hackers is not only not going to get you anywhere, It’s probably going to cause you problems because you really need to know how to install and configure the tools yourself to be successful in hacking. How else will you handle the moving on inside the system you have hacked when they don’t have Kali Linux in their network?
  • 6. Programming This is one of the most important skills to have in order to become a Hacker. Everything you see on your computer is already been programmed in some programming language. So, to become a Computer Hacker, you must have a deep understanding of the programming languages. Start off with Python. It’s simple, it’s easy and it’s powerful. It’s great for tasks’ automation and writing your own tools. LEARN TO PROGRAM IN C!!!! C is perhaps the most versatile programming language. If you can learn to program in C, you can learn ANY programming language in the world. All operating systems are written in C, so if you can program in C then you can easily write exploitation tools to hack into any OS. Be it Windows, Linux or Mac OS X. There are tons and tons of free C tutorials out there. I’d recommend “C programming – thenewboston” on YouTube or any of C programming courses on Udemy. However, Udemy is not entirely free, there are some free and some paid courses.
  • 7. Networking Concepts The networking concept needs to be sharp when you want to be a hacker. Understanding how the networks are created is important, however, you need to know the differences between different types are networks. Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web. Understand what is subnet, LAN, WAN and VPN. The networking commands to do a HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence, it is necessary to learn this protocol in order to break the barriers. The hackers often use the HTTP gateway to breach the security of the system and take control over it. Learn how to use all this knowledge with a programming language. All In all, you really need to have a deep understanding of TCP/IP, DNS, NAT, DNCP, Switching, Routers, Private and Public IP, Mac address, subnetting, IPv4 and IPv6.
  • 8. Learn LINUX Fuck Windows. Seriously, fuck Windows. The Windows operating system may be easy and convenient for most users, but it is certainly not suited for hackers. With the exception of few windows only tools, most hacking tools run best under Linux environment. Linux is open-source and you’re less likely to get hit with firewalls. However, I don’t recommend using Linux directly on your computer as a primary OS on your hard disk (if you want to use it for hacking). Create a Linux live bootable USB or run Linux on a Virtual Machine
  • 9. Learn Cryptography As an expert hacker, you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for internet and networking. It is the practice and study of techniques that are used for secure communication in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentication. Moreover, the technology of cryptography is extensively used in ATM cards, computer passwords and e-commerce. While hacking, these encrypted codes needs to be broken, which is called decryption. Cryptography is heavily used in SSL based internet communication. An expert hacker should be able to understand how SSL works and what is the importance of cryptography in keeping SSL secure. Try reading about various encryption algorithms and see why they are difficult to decrypt. Participate in challenges for decrypting a powerful encryption. An expert hacker will be able to demonstrate weaknesses in a encryption algorithm and should be able to write a program that can show how decryption can be performed without much information about keys.
  • 10. Staying anonymous The most important thing for a hacker is to remain “anonymous” i.e when you will do any illegal activities or even any ethical stuff you won’t be caught by cops. Use a VPN or a proxy. A VPN like hides your IP by connecting you to another server, a proxy actually does the same! You only have to use a VPN or Proxy when you’re doing your activities, after them, you turn it off. Let me explain it a bit. People will do everything to find you, so even a little mistake can lead you to cops or you can be found! You have to put people on a dead track. Whenever planning to do some hacking stuff you start your PC on with a proxy, and then do you work and then turn off the proxy after completing the work and don’t use the internet for 20-30 mins after that, you start it up without any proxy, and do your legal normal things.