How to Become a Hacker ?

How to Become a Hacker ?

Just Follow 5 Steps...

1. Run on OS which is similar to UNIX, like Linux

In today’s cyber world, lots of varied attacks occur every hour and are achieved by professional hackers, virus writers and crackers. The most basic tool required by every hacker is a hacking operating system. Usually, the operating systems in hacking are based on the Linux kernel. These operating systems are regarded as advanced working systems, which include lots of ethical hacking and penetration testing tools.
In this article, the best operating systems used by ethical hackers and penetration testers are featured. All of them are free, open source, are based on the Linux kernel and are bundled with many hacking tools.

 1. Kali Linux

 Kali Linux is based on the Debian-Linux distribution, and is especially designed for digital forensics and penetration testing. It is maintained and updated on a regular basis by Offensive Security Ltd, under the leadership of Mati Aharoni, Devon Kearnals and Raphael Hertzog who are core developers. Kali comes pre-installed with more than 300 penetration testing programs and can be installed as a primary operating system on the hard disk, live CD/USB and can even run as a virtual machine using some virtualisation software.
Kali Linux supports both 32-bit and 64-bit images for use with x86 machines, and even supports various development boards like Raspberry Pi, BeagleBone, Odroid, CuBox, etc.

you can Download this os from this link kali


Tool categories
  • Information gathering: These tools are used to gather information regarding DNS, IDS/IPS, network scanning, operating system, routing, SSL, SMB, VPN, VOPI, SNMP, email and VPN.
  • Vulnerability assessment: These tools access the CISCO network and discover vulnerabilities in several database servers.
  • Web applications: These tools are related to Web applications like content management systems, database exploitation, application proxies, Web vulnerability scanners, etc.
  • Password attacks: These tools perform password attacks via brute force, dictionary attacks, etc.
  • Exploitation tools: These exploit vulnerabilities in target systems for networks, the Web and databases, and to perform social engineering attacks.
  • Sniffing and spoofing: These tools sniff the network and Web traffic.
  • Maintaining access: These tools maintain access to the target machine, to assess operating system back doors and for tunnelling.
  • Reporting tools: These document the penetration testing process.
  • System services: These tools contain various pen-testing services like Apache, MySQL, SSH and Metasploit services.
Kali Linux is bundled with several tools that perform wireless attacks, reverse engineering, stress testing, hardware hacking and forensics.

Key features:
  • Bundled with more than 600 penetration testing tools as compared to Backtrack OS.
  • Completely free and open source and committed to GitHub, with the source code of each package being available.
  • Kali Linux is FHS (Filesystem Hierarchy Standard) compliant to locate binaries, and support files and libraries.
  • Kali Linux offers a custom kernel for customised coding and patching up the latest updates.
  • Every package in it is GPG signed and, hence, committed to high quality standards by developers.
  • ARMEL and ARMHF support allows Kali Linux to be installed on various other devices like Pi, Odroid, Chromebook, etc.
2.Parrot Security Operating System (My Fav OS)


Parrot Security OS is based on Debian GNU/Linux combined with the Frozenbox OS and Kali Linux to provide ethical hackers the best-in-class experience of penetration and security testing in real-world environments. It is also designed to provide vulnerability assessment and mitigation, computer forensics and anonymous Web browsing, by the Frozenbox team.
Parrot Security OS makes use of Kali repositories for all sorts of package updates and to integrate new tools. It makes use of the MATE desktop environment using the LightDM display manager to provide an easy-to-use GUI and lightweight environment for computer system analysts to perform all sorts of forensics, vulnerability assessment and cryptography. This OS is known for being highly customisable and for its strong community support.

You can Download this OS from this link parrot

Key features:
  • Equipped with the highly customisable kernel version 4.5, it is currently under rolling release upgrade line and based on Debian 9.
  • Has custom anti-forensic tools, interfaces for GPG, Cryptsetup, and support for LUKS, Truecrypt and VeraCrypt.
  • It supports FALCON 1.0 programming language, multiple compilers, debuggers and the Qt5 and .NET/mono frameworks.
  • Supports Anonsurf including anonymisation of the entire OS, TOR, I2P anonymous networks and beyond.
  • A special edition of Parrot Cloud, designed for servers, comprises lightweight Parrot OS distributions without graphics, wireless and forensics tools, and acts as a VPS or dedicated server with only useful security tools.
3.BlackArch Linux
 
BlackArch is an Arch Linux-based security and penetration testing distribution, which consists of more than 1600 tools and is regarded as the first choice distribution among security researchers to do Web and applications based security testing. It is a strong alternative to Kali Linux and Backbox in terms of the variety of its tools and ease of use.
BlackArch is basically a lightweight extension to Arch Linux for security researchers, as the tool set within the former is distributed as the Arch Linux unofficial user repository and can even be installed on top of existing Arch Linux.
Arch Linux can be installed on 32-bit and 64-bit machines including ARM based development boards like Raspberry Pi, BeagleBone, etc.
Key features:
  • GUI interface is powered by Fluxbox and includes i3, WMii, Spectrwm, Awesome, dwm and Openbox window managers.
  • Has modular package groups.
  • Installation can be performed from source.
You can Download this OS from this link black arch

2. Learn HTML

 
Hypertext Markup Language is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets and scripting languages such as JavaScript.

3. Gain the knowledge of Programming

we’ll be discussing the 15 best hacking programming language for ethical hackers. Before delving right into the list, however, you need to keep in mind that the best programming language for hacking will merely depend on what type of attack you choose to carry. Any language can be the deal breaker as long as you create a perfect strategy.

1. Python (my fav)

The de-facto language for hacking programming, Python is heralded as the best language for hacking – and for good reasons so. Ethical hackers often use this dynamic programming language for scripting their on-demand hacking programs on the go. From testing the integrity of corporate servers to automating most of your hacking programs, Python lets you do almost anything if used the right way.


Highlights of this hacking Python language

  • The interpreted nature of Python allows it to run without the need for compilation.
  • An easy-to-read language that’s helpful for beginning ethical hackers.
  • Has a massive community that wields useful 3rd-party plugins/library every day.
  • One of the best programming language for hacking into web servers.
  • Makes it fairly easy to write automation scripts.
  • Python lets you do a fast reconnaissance of the target network and makes prototyping much faster.

2. SQL

SQL stands for Structured Query Language and is one of the most favorite hacking programming language for ethical hackers. This programming language is used to query and fetch information from databases. As most web-based software store valuable information like user credentials in some form of a database, SQL is the best programming language for hacking into corporate databases. Without a complete understanding of SQL, you will not be able to counteract database attacks.

Highlights of this hacking coding language

  • SQL is not a traditional Programming used for only communicating with databases.
  • Black hat hackers use this language to develop hacking programs based on SQL injection.
  • SQL is often used by hackers to run unauthorized queries in order to obtain unhashed passwords.
  • Popular SQL databases include MySQL, MS SQL, and PostgreSQL.

3. Ruby

 One of the best programming language for hacking multi-purpose corporate systems, Ruby is syntactically very similar to Python. Although both languages are great at automating common hacking programs, Ruby is much more web-focused. Ruby is arguably one of the best programming language for hacking due to the superior flexibility it offers while writing exploits. This is the reason, Metaspolit , the most infamous penetration testing framework, chose Ruby as its base language.

Highlights of this hacking programming language

  • Ruby is essential if you want to master the art of writing effective exploits.
  • This scripting language borrows a lot of syntactical elements from Smalltalk and is an excellent option for writing fast hacking programs.
  • Ruby is often used by veteran hackers to write CGI scripts after compromising a network.
  • A lot of next-generation web application is built with the Rails platform, thus making Ruby the best option for breaking them.

4. Bash

Although not exactly a full-fledged programming language, proficiency in Bash is a must if you want to master hacking programming. Bash is the default command shell in most Unix systems, and every major server is built on top of Unix. So, after you’ve gained access on a network by utilizing a combination of Hacking Programing , Bash will come handy manipulating the system itself. It can be thought of as the swiss army knife of modern hacking programs and is a must for security enthusiasts.

Highlights of this hacking coding language

  • Bash lets you automate most of the hacking programs that you will use for network pentesting.
  • If you’re looking for creating highly complicated scripts that require modifying the filesystem and directory tree, then bash is the best scripting choice.
  • A deep understanding of this command shell is mandatory to utilize hacking programs like NMAP, Armitage, and Metaspolit properly.
  • Being able to write and understand complex shell scripts allow you to penetrate and control hard to break systems.

5. JavaScript

Thanks to the recent inception of Node.JS, JavaScript has overtaken PHP’s role of the de-facto language of the web. So, it has become the best programming language for hacking web applications. Security professionals often mimic black hat hacker’s method of writing cross-site scripts in JavaScript. As this hacking coding language can manipulate front-end web components as well as their back-end counterpart, it has become a well sought after language for hacking complex web apps.

Highlights of this hacking programming language

  • It is the de-facto choice for developing XSS hacking programs.
  • JavaScript can manipulate the browser DOM very easily, thus making it a viable solution for building internet worms.
  • It can be used for mimicking attacks not only on the server side but also on the client side.
  • JavaScript is the go-to language for creating adware hacking programs, rising increasingly in recent times.
  • Since JavaScript can be used to build cross-platform desktop software, hackers might utilize it for attacks like buffer overflow and stack overflow.

6. PHP

PHP is an acronym for Hypertext PreProcessor, a dynamic programming language upon which CMS‘s like WordPress and Drupal are built on. As most of the personal websites you see on the internet is based on these CMSs, in-depth knowledge of PHP is a must for compromising such networks. So, if web hacking is your niche, then we certainly recommend you sharpen your PHP skills.

Highlights of this hacking programming language

  • PHP is used extensively in Server Side Script, so knowledge of this hacking programming language is essential if you want to develop server hacking programs.
  • Older PHP websites often contain deprecated scripts, manipulating them effectively can give you easy access to servers.
  • A deeper understanding of this hacking coding language means you’ll be prepared to take down faulty websites as soon as you spot them.
  • PHP is undoubtedly the best programming language for hacking personal websites.

7. Java

Java is still the most widely used programming language in the industry. It’ powers many “legacy” as well as modern web servers, like the Apache Tomcat and Spring MVC. Moreover, with the inception of Android, Java code now runs on more than 3 billion mobile devices. So, this language is still relevant despite what many may believe. If you’re looking for the best programming language for hacking into mobile devices, Java is the language for you.

Highlights of this hacking coding language

  • Just like C++, Java is also widely used by hackers to reverse engineer paid software.
  • It is used heavily by professional penetration testers to curate scalable servers for delivering payloads.
  • Java makes it possible to develop state of the art hacking programs for advanced ethical hackers.
  • Contrary to C++, Java is dynamic in nature. This means once you write your hacking programs with Java, you can run them on any platform that supports Java.
  • A deeper understanding of Java is integral to develop hacking programs for the Android system.

4. Start Writing Open Source Software

Open-source software is a type of computer software in which source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner

 
* Learn to use github Github

5. Learn more on networking

 

This document covers the basics of how networking works, and how to use different devices to build networks. Computer networking has existed for many years, and as time has passed the technologies have become faster and less expensive. Networks are made up of various devices—computers, switches, routers—connected together by cables or wireless signals. Understanding the basics of how networks are put together is an important step in building a wireless network in a community or neighborhood.
This module covers the concepts of:
  1. Clients and servers—how services such as e-mail and web pages connect using networks.
  2. IP addresses—how devices on a network can be found.
  3. Network hubs, switches and cables—the hardware building blocks of any network.
  4. Routers and firewalls—how to organize and control the flow of traffic on a network.
Reading through this material should take between half an hour to an hour. Exploring the activities and details of the subject with a group will take longer.

 

 

Comments

Post a Comment

Popular Posts