- Black Hat | Bad Hacker
- Grey Hat | Both Good And Bad
- White Hat | Good Hacker
- Here’s the list of skill a ethical hacker should have link
Operating Systems (Specifically Linux/Unix)
A true hacker totally depends on open source and freeware . Also operating systems Linux/Unix OS(s) are best to learn hacking and also to hack anything.A hacker must have a good knowledge of Linux Operating Systems like: Red Hat, Kali Linux, Debian, Back Box. Its very important to learn more than one Linux Operating System.
Programming
It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free tutorials are easily available online over the internet. Specifically in hacking field languages like C++, Python, SQL etc. are very important.Cryptography
Now this is where the things get interesting, you are a hacker and you are transferring files over internet to your pal and another hacker breaks in and takes your file and now he know everything, to prevent this you need to master the art of cryptography. Look for cryptography tutorial over internet and learn it.Networking Concepts
You need to be good at networking concepts and understand how the
networks are created. You need to know the differences between different
types of networks and must have a clear understanding of TCP/IP and UDP
to exploit loop holes in a system. Understanding what LAN, WAN, VPN,
Firewall is also important. You must have a clear understanding and use
of network tools such as Wireshark, NMAP for packet analyzing, network
scanning etc.
Learn A Lot
Visit websites which teach hacking and networking exploitation signup on hacking forum ask help discuss with other hacker. Learn from expert hacker. Learn about phishing, sniffer, Trojans, RATs etc. Also learn good amount of batch programming and shell programming.Practice
After learning few programming concepts or OS concepts sit and practice them. Set up you own Hacker Lab with a good system with good processor and RAM because your regular system won’t handle hacking too smoothly.Find/ Write Vulnerabilities
Vulnerability is the weakness or a loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own vulnerability programs and exploit the system.Part 2
Protection
In hacking industry most important thing is security, anonymity and protection. Play cool and be safe. There are numerous rules in the hacking area I’ll list few of them.- Don’t mess with government. You may be a great hacker but hacking government, not a good idea they will hunt you with their best of best hacker and catch you so no government.
- Don’t mess with big international level or rich company. Again the rich douches will bring you down.
- Never hack or destroy a website supporting education for poor, home for poor or any program for backward countries, you will be a disgrace and other hackers will leave you to nothing.
- Don’t hack for personal gain. Fight for rights and seek information. Like Anonymous.
Methods of Protection
Don’t Use Windows
Windows is full of holes that can be exploited. These holes may allow spyware to infest, completely overcoming all your anonymity efforts. Any good hacker avoids Windows. Instead, they use security hardened open-source operating systems, such as Tails and Whonix.Never Connect To Internet Directly
Connecting to internet directly means giving away your privacy by showing you IP.Avoid anyone tracking down you’re real IP address through using VPN or Proxy. VPN enables users to create a encrypted private tunnel. Anyone attempting to trace from the internet side can only see the address of the VPN server, which could be a server located in any country around the world you choose. Here is a tutorial telling what is Proxy and how to get one and use. LINK:
Never Mail Using Your Real ID
Instead, use anonymous email services or remailers. Anonymous email services allow you to email someone without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it on anonymously. To know how to send anonymous mail visit HEREDon’t Use Google
Google makes track everything you do in order to serve up adverts that you might click on. And as useful as the search engine is, there are ways to get the best out of it without compromising your identity. Services such as Start Page serve up google results but doesn’t store IP addresses, cookies or records of your searches. DuckDuckGo provides a similar service.An Advice
Learning, is essential to hacking. You must
first learn then hack. You cannot be lazy. To become a hacker you also
need to read a lot. It’ll take you around 2-4 years of learning to be a
real hacker. If you think its too much you shouldn’t be a hacker. You
need to spend at least 3-4 hrs a day with computers learning, I don’t
think its too much computers are really interesting I spend my 2/3 of
the day with computer.
Part 3
Now things are going to be bit serious here
you have to decide do you really want it or not, and if yo want it how
bad do you want it. Now as I’ve mentioned above about Linux its very
important for hacker for all beginner hackers here I’d recommend you to
get yourself a Linux OS as for beginner I’d recommend Kali, It good for
both beginner and pro hacking you can download it easily google for
Kali Linux and you can download it.
Now there are two ways you can run Kali or any other Linux OS
- Regularly installing with dual boot.
- Boot using a SB Drive.
How to make USB Portable?
- Download your Linux OS
- Download tool given in the link |Link|
- Install the tool
- Follow tool and choose your Kali iso file
- Choose your USB drive
- Done
df
The command for checking available disc spaceThe computer users are often known to check the availability and consumed memory space over their systems for both the Linux and Windows desktop PCs. You can easily check the amount of memory available over the disk at your Linux system by simply typing the command of DF. It helps in offering you the status of file system disk space over your Linux based system.
df -h
du
Display disk space use by each file in the file system
- Display disk usage by each file in Documents directory
du -h Documents
- Display disk usage by the whole Documents direcotry
du – sh Documents
top
Display the top running processes on the system with memory and cpu utilization.- Display all top running processes
top
- Display all top running processes from user fromdev
top -U fromdev
Assuming you’ve read the commands and have understood I wanna clear one thing you cannot just read and cram it you will need to practice it a lot.
Now moving on to security Cryptography
What Is Cryptography?
Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into non human readable formats or providing an extra layer of protection to your stuff. The process of transforming information into non human readable form is called encryption. The process of reversing encryption is called decryption. It’s just like basic lock and unlockA plaintext is encrypted using a key and becomes a Cipher Text and the same Cipher Text is decrypted using the same key and becomes plain text.
What Is Cipher?
The information which is encrypted is known as Cipher.Now there are many algorithms of cryptograpy, I suggest you pay visit to this page and check them out. LINK
Now there is a program I wrote to encrypt your any file using RC4 Encryption Algorithm I would suggest you to give it a shot. Link
And this tool will give you idea what encryption actually does, I would also like to hear your comments about my tool and any problem just put a comment I’m here always.
Part 4
Now here we move on to programming and cryptography[again], but you gotta know cryptography is very important and I have a very good solution to make you understand it fully.Dan Boneh – Stanford University
Here this guy tell you everything you gotta know about cryptography and fully free course, with great ease and understandable language, so I’d suggest you take a look at this course and get the cryptography easily enough. LINKNow moving on to programming you got to learn C++ or C for that I have a good book for beginners this will give you basic idea and programming knowledge to go on to the intermediate level. The book is free and and has about 280 pages of full fun. LINK
And if you wanna know the news of the hacking world and take a look around hackers you gotta visit this LINK
No comments:
Post a Comment