How To Become A Security Expert In This Internet World

 How To Become A Security Expert In This Internet World





Now most of hearing the word hacker and fear strikes, anger strikes in our minds. It is generally because a hacker is misunderstood guy in society. Not all hackers are bad, there are three types of hackers :

Black Hat = Anyone who uses his hacking skills for causing harm or with a malicious nature

Grey Hat = A Grey Hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards but does not have the malicious intent typical of a black hat hacker.

White Hat = A White Hat is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.


Now here we have a good list to guide you on how to become a hacker. Follow them and fulfill your dream.

Operating Systems (Specifically Linux/Unix)

A true hacker totally depends on open source and freeware. Also operating systems Linux/Unix OS(s) are best to learn to hack and also to hack anything.




A hacker must have a good knowledge of Linux Operating Systems like Red Hat, Kali Linux, Debian, Black Box. It's very important to learn more than one Linux Operating System.


Programming

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free tutorials are easily available online over the internet. Specifically, in the hacking field languages like C++, Python, SQL, etc. are very important.


Cryptography

Now this is where the things get interesting, you are a hacker and you are transferring files over the internet to your pal and another hacker breaks in and takes your file and now he knows everything, to prevent this you need to master the art of cryptography. Look for a cryptography tutorial over the internet and learn them.


Networking Concepts

You need to be good at networking concepts and understand how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit loopholes in a system. Understanding what LAN, WAN, VPN, Firewall is also important. You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning, etc.


Learn A Lot

Visit websites that teach hacking and networking exploitation signup on hacking forum ask help to discuss with other hackers. Learn from expert hackers. Learn about phishing, sniffer, Trojans, RATs, etc. Also, learn a good amount of batch programming and shell programming.


Practice

After learning few programming concepts or OS concepts sit and practice them. Set up your own Hacker Lab with a good system with a good processor and RAM because your regular system won’t handle hacking too smoothly.


Find/ Write Vulnerabilities

Vulnerability is the weakness or a loophole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network, etc. Try to write your own vulnerability programs and exploit the system.

And always keep practicing; never stop learning. Cheers :)


Protection

In hacking industry, the most important thing is security, anonymity, and protection. Play cool and be safe. There are numerous rules in the hacking area I’ll list a few of them.

  • Don’t mess with the government. You may be a great hacker but hacking the government, not a good idea they will hunt you with their best of best hacker and catch you so no government.
  • Don’t mess with big international level or rich company. Again the rich douches will bring you down.
  • Never hack or destroy a website supporting education for the poor, home for poor, or any program for backward countries, you will be a disgrace and other hackers will level you to nothing.
  • Don’t hack for personal gain. Fight for rights and seek information. Like Anonymous.


Methods of Protection

Don't Use Microsoft Windows Operating System

Windows is full of holes that can be exploited. These holes may allow spyware to infest, completely overcoming all your anonymity efforts. Any good hacker avoids Windows. Instead, they use security-hardened open-source operating systems, such as Tails and Whonix.

Never Connect To Internet Directly

Connecting to internet directly means giving away your privacy by showing you IP. Avoid anyone tracking down you’re real IP address through using VPN or Proxy. VPN enables users to create an encrypted private tunnel. Anyone attempting to trace from the internet site can only see the address of the VPN server, which could be a server located in any country around the world you choose. 

Never Mail Using Your Real Mail ID

Instead, use anonymous email services or remailers. Anonymous email services allow you to email, someone, without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it anonymously.

Avoid Using Google

Google makes track of everything you do in order to serve up adverts that you might click on. And as useful as the search engine is, there are ways to get the best out of it without compromising your identity. Services such as StartPage serve up google results but don’t store IP addresses, cookies, or records of your searches. DuckDuckGo provides a similar service.

An Advice

Learning is essential to hacking. You must first learn then hack. You cannot be lazy. To become a hacker you also need to read a lot. It’ll take you around 2-4 years of learning to be a real hacker. If you think it's too much you shouldn’t be a hacker. You need to spend at least 3-4 hrs a day with computers learning, I don’t think it's too many computers that are really interesting I spend 2/3 of the day with computers.




Now things are going to  be a bit serious here you  have to decide do you really want it or not, and if you want it how bad do you want it. Now as I’ve mentioned above about Linux, it's very important for a hacker for all beginner hackers here I’d recommend you to get yourself a Linux OS as for beginner I’d recommend Kali, It good for both beginner and  pro hacking you can download it easily on google for Kali Linux and you can download it.

Now there are two ways you can run Kali or any other Linux OS

Regularly installing with a dual boot or boot using an SB Drive.

Here I’d recommend USB Flashing because it is portable and convenient.

How to make USB Portable?

Download your Linux OS

Download tool which is given in the link |Link|

Install the Tool

Follow the tool and choose your Kali iso file

Choose your USB drive

Done

Now Linux  OS Is mostly command-based so you need to know some basic commands to operate it. Example:

df

The command for checking available disc space
Computer users are often known to check the availability and consumed memory space over their systems for both the Linux and Windows desktop PCs. You can easily check the amount of memory available over the disk at your Linux system by simply typing the command of DF. It helps in offering you the status of file system disk space over your Linux-based system.

df -h

du

Display disk space use by each file in the file system

Display disk usage by each file in Documents directory

du -h Documents

Display disk usage by the whole Documents directory

du – sh Documents

top

Display the top running processes on the system with memory and CPU utilization.

Display all top running processes

top

Display all top running processes from user fromdev

top -U fromdev

There are many commands but I can not put them in here but if you want a list of Commands please let me know in the comment section I will put the Command list as soon as possible.


What Is Cryptography?

Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into non-human readable formats or providing an extra layer of protection to your stuff. The process of transforming information into a non-human readable form is called encryption. The process of reversing encryption is called decryption. It’s just like a basic lock and unlocks.

To illustrate it have a look at the picture below




A plaintext is encrypted using a key and becomes a Road Of Info Text and the same Road Of Info Text is decrypted using the same key and becomes plain text.

The information which is encrypted is known as Road Of Info.


Post a Comment

Previous Post Next Post