A lot of people ask me how to become a hacker. First, ask yourself, what kind of hacker do you want to become? There are people who create hacks, and people who just use them. The hackers with the ability to develop their own hacks distinguish themselves for a tool user, a script kiddie.
A hacker has a deep understanding of how systems operate. This is not limited to computersystems/software, but can also be applied to e.g. government systems.
By understanding how a system/application/game functions, a hacker is able to manipulate the behavior, or gain access.Instead of the daily bullshit how to hack Facebook question, let’s post something that actually will help people who want to educate themselves to become a proper and powerful hacker!
‘Hacker’ is a loose term and has different meanings
Generally the term ‘Hacker’ is someone who breaks into computer networks for the happiness he gets from the challenge or with some other intentions like stealing data for money or with political motivations.
Hackers are classified to different types
Some of them are listed below:
_ A White Hat hacker is a computer network security professional and has non-malicious intent whenever he breaks into security systems. A White Hat hacker has deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming).
White Hat hacker has also good knowledge in hacking tools and know how to program hacking tools.A White Hat hacker has the skills to break into networks but he uses his skills to protect organizations. A White Hat hacker can conduct vulnerability assessments and penetration tests are also known as an Ethical Hacker.
Often White Hat hackers are employed by companies and organizations to check the vulnerabilities of their network and make sure that no hole is available in their network for an intruder.__
A Black Hat hacker, also known as a cracker, is a computer professional with deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming). Black Hat hacker has also good knowledge in many hacking tools and know how to program hacking tools. A Black Hat hacker uses his skills for unethical reasons. A Black Hat hacker always has malicious intention for intruding a network.
Example: To steal research data from a company, To steal money from credit cards, Hack Email Accounts
A Grey Hat hacker is someone who is between White Hat hacker and Black Hat hacker. Grey Hat normally do the hacking without the permissions from the administrators of the network he is hacking. But he will expose the network vulnerabilities to the network admins and offer a fix for the vulnerability for money.__Script Kiddie:__ A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.
STEP 1: OPERATING SYSTEM
The first step for any hacker would be to master the operating system of choice. To hack effectively, you must know and understand your operating system and to a large extent, the operating system you are attacking. Linux is totally transparent, meaning we can see and manipulate all its working parts.
Linux is granular. That means that we have almost infinite amount of control over the system. In Windows, you only can control what Microsoft allows you to control. In Linux, everything can be controlled by the terminal in the most miniscule to the most macro level.
In addition, Linux makes scripting in any of the scripting languages simple and effective.
Well over 90% of all hacking tools are written for Linux. Of course, there are exceptions like Cain and Abel and Havij, but those exceptions simply emphasize the rule. Even when hacking tools such as Metasploit or nmap are ported for Windows, not all the capabilities transfer from Linux.To get started with network hacking, it’s highly recommended to get a Linux distro, of which Kali is most popular among hackers for various good reasons, more on Kali later on this page. However, if you’re up to e.g. game hacking or password cracking Windows does a good job, so it kind of depends of what you are exactly up to. Generally Linux would be your choice for anything network related, such as WPA2 cracking or rerouting traffic/DNS and MITM (man in the middle) attacks.
STEP 2: SHELL
The second step would be to learn shell scripting. Scripting allows you to automate commands supported by your operating system, it can be very fast and powerful. In addition, experience in scripting makes learning programming a lot easier! If you can gain shell access to a system, through let’s say telnet, you can make the system you’ve taken over basically do anything you want it to. A DDoS botnet using IOT camera’s is good example of what could be done when someone or bot gains access to a shell.
STEP 3: PROGRAMMING
A good start is to learn some coding such as C++ and/or Python. If you acquire this skill, your understanding of software will grow a lot.
Hacking a game’s score or bypassing certain protection won’t be much of a challenge if you can vision how it would probably work from a developers point of view.
Getting started with programming seems always harder than it really is, C++ can be a little too much to start with, where Python is more rewarding (fast results) for a beginner. Therefor I recommend starting with Python. Python is an interpreted, object-oriented, high-level programming language with dynamic semantics. Its high-level built in data structures, combined with dynamic typing and dynamic binding, make it very attractive for Rapid Application Development, as well as for use as a scripting or glue language to connect existing components together. Python’s simple, easy to learn syntax emphasizes readability and therefore reduces the cost of program maintenance. Python supports modules and packages, which encourages program modularity and code reuse.
The Python interpreter and the extensive standard library are available in source or binary form without charge for all major platforms, and can be freely distributed.When you’re ready for C++, get CodeBlocks, a GCC/G++ compiler IDE which is free, cross-platform and powerful. C/C++ requires the programmer to manage all aspects of the program, such as memory allocation, dealing with addressing, etc. Python and similar languages are higher level, relying on the interpreter and OS to do much of that.C++ allows direct dealings with hardware that Python can’t do. The C++ compiler is designed to make raw machine code that the hardware can understand.
Python is converted to bytecode, which is then interpreted by the operating system.
Thus, the OS is middleware between Python and the hardware; by default, direct hardware access is restricted.The same thing happens with .NET languages, Java, and most other common languages nowadays. This is why low level languages like C and C++ won’t be going away any time soon; there currently is no way to use higher level languages to replicate the functionality.
STEP 4: BASIC NETWORKING KNOWLEDGE
without a basic understanding of networking, hacking something would be next to impossible, but you can get away by obtaining a basic knowledge of networking. Obviously, the more you know about networking the better and faster your hacking will be. I recommend you to visit Cisco for networking knowledge, their website offers a lot of essential information. Start with Cisco’s Explanation of IP’s so you understand how these addresses function. Then checkout Cisco’s Networking Basics to understand what a switch/router/etc.
STEP 5: PENTESTING
Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.Network hacking, penetration tests, scanning is nowadays mainly done through Kali Linux. This modified distro has about all the essential hacking tools available and is widely known and supported. There are many instruction videos on YouTube about using Kali for different purposes. It remains one the most powerful hacking distros to this day.Good luck on your studies.