Sunday 20 December 2015

How To Become A Hacker

How To Become A Hacker

Now most of hear the word hacker and fear strikes, anger strikes in our minds. It is generally because a hacker is misunderstood guy in society. Not all hackers are bad, there are three types of hackers :
  • Black Hat | Bad Hacker
  • Grey Hat | Both Good And Bad
  • White Hat | Good Hacker
Now here we have a good lists to guide you how to become a hacker. Follow them and fulfill your dream.
Here’s the list of skill a ethical hacker should have. Link

Operating Systems (Specifically Linux/Unix) :

A true hacker totally depends on open source and freeware . Also operating systems Linux/Unix OS(s) are best to learn hacking and also to hack anything.



A hacker must have a good knowledge of Linux Operating Systems like: Red Hat, Kali Liux, Debian, Back Box. Its very important to learn more than one Linux Operating System.

Programming :

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free tutorials are easily available online over the internet. Specifically in hacking field languages like C++, Python, SQL etc. are very important.

Cryptography :

Now this is where the things get interesting, you are a hacker and you are transferring files over internet to your pal and another hacker breaks in and takes your file and now he know everything, to prevent this you need to master the art of cryptography. Look for cryptography tutorial over internet and learn it.

Networking Concepts :

You need to be good at networking concepts and understand how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit loop holes in a system. Understanding what LAN, WAN, VPN, Firewall is also important. You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

Learn A Lot :

Visit websites which teach hacking and networking exploitation signup on hacking forum ask help discuss with other hacker. Learn from expert hacker. Learn about phishing, sniffer, Trojans, RATs etc. Also learn good amount of batch programming and shell programming.

Practice :

After learning few programming concepts or OS concepts sit and practice them. Set up you own Hacker Lab with a good system with good processor and RAM because your regular system won’t handle hacking too smoothly.

Find/ Write Vulnerabilities :

Vulnerability is the weakness or a loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own vulnerability programs and exploit the system.


Part 2

Protection :

In hacking industry most important thing is security, anonymity and protection. Play cool and be safe. There are numerous rules in the hacking area i’ll list few of them.
  • Don’t mess with government. You may be a great hacker but hacking government, not a good idea they will hunt you with their best of best hacker and catch you so no government.
  • Don’t mess with big international lvel or rich company. Again the rich douches will bring you down.
  • Never hack or destroy a website supporting education for poor, home for poor or any program for backward countries, you will be a disgrace and other hackers will leve you to nothing.
  • Don’t hack for personal gain. Fight for rights and seek information. Like Anonymous.
Methods of Protection :

Don’t Use Windows

Windows is full of holes that can be exploited. These holes may allow spyware to infest, completely overcoming all your anonymity efforts. Any good hacker avoids Windows. Instead, they use security hardened open-source operating systems, such as Tails and Whonix.

Never Connect To Internet Directly

Connecting to internet directly means giving away your privacy by showing you IP.
Avoid anyone tracking down you’re real IP address through using VPN or Proxy. VPN enables users to create a encrypted private tunnel. Anyone attempting to trace from the internet side can only see the address of the VPN server, which could be a server located in any country around the world you choose. Here is a tutorial telling what is Proxy and how to get one and use. LINK.

Never Mail Using Your Real ID

Instead, use anonymous email services or remailers. Anonymous email services allow you to email someone without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it on anonymously. To know how to send anonymous mail visit HERE

Don’t Use Google

Google makes track everything you do in order to serve up adverts that you might click on. And as useful as the search engine is, there are ways to get the best out of it without compromising your identity. Services such as StartPage serve up google results but doesn’t store IP addresses, cookies or records of your searches. DuckDuckGo provides a similar service.

An Advice

Learning, is essential to hacking. You must first learn then hack. You cannot be lazy. To become a hacker you also need to read a lot. It’ll take you around 2-4 years of learning to be a real hacker. If you think its too much you shouldn’t be a hacker. You need to spend atleast 3-4 hrs a day with computers learning, I don’t think its too much computers are really interesting I spend my 2/3 of the day with computer.


Part 3

Now things are going to  be bit serious here you  have to decide do you really want it or not, and if yo want it how bad do you want it. Now as I’ve mentioned above about Linux its very important for hacker for all beginner hackers here I’d recommend you to get yourself a Linux OS as for beginner I’d recommend Kali, It good for both beginner and  pro hacking you can download it easily google for Kali Linux and you can download it.
Now there are two ways you can run Kali or any other Linux OS
  1. Regularly installing with dual boot.
  2. Boot using a SB Drive.
Here I’d recommend USB Flashing because it is portable and convenient.

How to make USB Portable?
  1. Download your Linux OS
  2. Download tool given in the link |Link|
  3. Install the tool
  4. Follow tool and choose your Kali iso file
  5. Choose your USB drive
  6. Done
Now Linux  OS Is mostly command based so you need to know some basic commands to operate it. Example:

df

The command for checking available disc space
The computer users are often known to check the availability and consumed memory space over their systems for both the Linux and Windows desktop PCs. You can easily check the amount of memory available over the disk at your Linux system by simply typing the command of DF. It helps in offering you the status of file system disk space over your Linux based system.

df -h


du

Display disk space use by each file in the file system
  • Display disk usage by each file in Documents directory
    du -h Documents
  • Display disk usage by the whole Documents direcotry
    du – sh Documents

top

Display the top running processes on the system with memory and cpu utilization.
  • Display all top running processes
    top
  • Display all top running processes from user fromdev
    top -U fromdev
Now I cannot explain all the commands here because the page will look messy, So visit this LINK For all basic commands.

Assuming you’ve read the commands and have understood I wanna clear one thing you cannot just read and cram it you will need to practice it a lot.



Now moving on to Security Cryptography :

What Is Cryptography?

Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into non human readable formats or providing an extra layer of protection to your stuff. The process of transforming information into non human readable form is called encryption. The process of reversing encryption is called decryption. It’s just like basic lock and unlock.
To illustrate it have a look ate the picture below


A plaintext is encrypted using a key and becomes a Cipher Text and the same Cipher Text is decrypted using the same key and becomes plain text.

What Is Cipher?

The information which is encrypted is known as Cipher.
Now there are many algorithms of cryptograpy, I suggest you pay visit to this page and check them out. LINK

Now there is a program I wrote to encrypt your any file using RC4 Encryption Algorithm I would suggest you to give it a shot. Link

And this tool will give you idea what encryption actually does, I would also like to hear your comments about my tool and any problem just put a comment I’m here always.


Part 4

Now here we move on to programming and cryptography[again], but you gotta know cryptography is very important and I have a very good solution to make you understand it fully.

Dan Boneh – Stanford University 

Here this guy tell you everything you gotta know about cryptography and fully free course, with great ease and understandable language, so I’d suggest you take a look at this course and get the cryptography easily enough. LINK

Now moving on to programming you got to learn C++ or C for that I have a good book for beginners this will give you basic idea and programming knowledge to go on to the intermediate level. The book is free and and has about 280 pages of full fun. LINK

And if you wanna know the news of the hacking world and take a look around hackers you gotta visit this LINK


Anonymous Hacker News And Forum : Link

THE HACKiNG SAGE Forum : Link

ask anything freely here or at forum I will reply as soon as I see them..

Enjoy!!!

Labels: , ,