How To Become A Hacker
How To Become A Hacker
Introduction
Dear
Reader,
a
lot of people ask us how to become a hacker. There are people who create hacks,
and people who just use
them. The hackers with the ability to develop their own hacks distinguish
themselves for a tool user, a script kiddie.
A
hacker has a deep understanding of how systems operate. This is not limited to
computer systems/software, but can also be applied to e.g. government systems.
By understanding how a system/application/game functions, a hacker is able to
manipulate the behavior, or gain access.
Types of Hackers
“Hacker”
is a loose term and has different meanings. Generally the term “Hacker” is
someone who breaks into computer networks for the happiness he gets from the
challenge or with some other intentions like stealing data for money or with
political motivations. Hackers are classified to different types. Some of them
are listed below.
White Hat: A White Hat hacker is a computer network
security professional and has non-malicious intent whenever he breaks into
security systems. A White Hat hacker has deep knowledge in Computer Networking,
Network Protocols and System Administration (at least three or four Operating
Systems and very good skills in Scripting and Programming). White Hat hacker
has also good knowledge in hacking tools and know how to program hacking tools.
A
White Hat hacker has the skills to break into networks but he uses his skills
to protect organizations. A White Hat hacker can conduct vulnerability
assessments and penetration tests are also known as an Ethical Hacker. Often
White Hat hackers are employed by companies and organizations to check the
vulnerabilities of their network and make sure that no hole is available in
their network for an intruder.
Black Hat: A Black Hat hacker, also known as a
cracker, is a computer professional with deep knowledge in Computer Networking,
Network Protocols and System Administration (at least three or four Operating Systems
and very good skills in Scripting and Programming). Black Hat hacker has also
good knowledge in many hacking tools and know how to program hacking tools. A
Black Hat hacker uses his skills for unethical reasons. A Black Hat hacker
always has malicious intention for intruding a network. Example: To steal
research data from a company, To steal money from credit cards, Hack Email
Accounts etc.
Grey Hat: A Grey Hat hacker is someone who is
between White Hat hacker and Black Hat hacker. Grey Hat normally do the hacking
without the permissions from the administrators of the network he is hacking.
But he will expose the network vulnerabilities to the network admins and offer
a fix for the vulnerability for money.
Script Kiddie: A Script Kiddie is basically a
hacker amateur who doesn’t has much knowledge to program tools to breaks into
computer networks. He often use downloaded hacking tools from internet written
by other hackers/security experts.
Become a hacker,
the basic required skills
of choice. To hack effectively, you must know and understand
your operating system and to a large extent, the operating system you are
attacking. Linux is totally transparent, meaning we can see and manipulate all
its working parts. Linux is granular. That means that we have almost infinite
amount of control over the system. In Windows, you only can control what
Microsoft allows you to control. In Linux, everything can be controlled by the
terminal in the most miniscule to the most macro level. In addition, Linux
makes scripting in any of the scripting languages simple and effective. Well
over 90% of all hacking tools are written for Linux. Of course, there are
exceptions like Cain and Abel and Havij, but those exceptions simply emphasize
the rule. Even when hacking tools such as Metasploit or nmap are ported for
Windows, not all the capabilities transfer from Linux.
To
get started with network hacking, it's highly recommended to get a Linux
distro, of which Kali is most popular among hackers for various good reasons,
more on Kali later on this page. However, if you're up to e.g. game hacking or
password cracking Windows does a good job, so it kind of depends of what you are
exactly up to. Generally Linux would be your choice for anything network
related, such as WPA2 cracking or rerouting traffic/DNS and MITM (man in
the middle) attacks.
STEP 2: SHELL: The second step would be to
learn shell scripting. Scripting allows you to automate commands supported by
your operating system, it can be very fast and powerful. In addition,
experience in scripting makes learning programming a lot easier! If you can
gain shell access to a system, through let's say telnet, you can make the
system you've taken over basically do anything you want it to. A DDoS botnet
using IOT camera's is good example of what could be done when someone or bot
gains access to a shell.
STEP 3: PROGRAMMING: A good start is to learn some
coding such as C++ and/or Python. If you acquire this skill, your understanding
of software will grow a lot. Hacking a game's score or bypassing certain
protection won't be much of a challenge if you can vision how it would probably
work from a developers point of view.

When
you're ready for C++, get CodeBlocks, a GCC/G++ compiler IDE which is free,
cross-platform and powerful. C/C++ requires the programmer to manage all
aspects of the program, such as memory allocation, dealing with addressing,
etc. Python and similar languages are higher level, relying on the interpreter
and OS to do much of that.
C++
allows direct dealings with hardware that Python can't do. The C++ compiler is
designed to make raw machine code that the hardware can understand. Python is
converted to bytecode, which is then interpreted by the operating system. Thus,
the OSis middleware between Python and the hardware; by default, direct
hardware access is restricted.
The
same thing happens with .NET languages, Java, and most other common languages
nowadays. This is why low level languages like C and C++ won't be going away
any time soon; there currently is no way to use higher level languages to
replicate the functionality.
STEP 4: BASIC NETWORKING KNOWLEDGE: without
a basic understanding of networking, hacking something would be next to
impossible, but you can get away by obtaining a basic knowledge of networking.
Obviously, the more you know about networking the better and faster your
hacking will be. I recommend you to visit Cisco for networking knowledge, their
website offers a lot of essential information. Start with Cisco's Explanation
of IP's so you understand how these addresses function. Then checkout Cisco's
Networking Basics to understand what a switch/router/etc. is.
STEP 5:
PENTESTING: Kali Linux is an open source project that is maintained and
funded by Offensive Security, a provider of world-class information security
training and penetration testing services. In addition to Kali Linux, Offensive
Security also maintains the Exploit Database and the free online course,
Metasploit Unleashed.
Network
hacking, penetration tests, scanning is nowadays mainly done through Kali
Linux. This modified distro has about all the essential hacking tools available
and is widely known and supported. There are many instruction videos on YouTube
about using Kali for different purposes. It remains one the most powerful
hacking distros to this day.
Good
luck on your journey to become a hacker, if you have questions you can contact
the team on our facebook group.
@goethicalhack
Comments
Post a Comment