How To Become A Security Expert In This Internet World
Now most of hearing the
word hacker and fear strikes, anger strikes in our minds. It is generally
because a hacker is misunderstood guy in society. Not all hackers are bad, there
are three types of hackers :
Black Hat = Anyone who uses his hacking skills for causing harm or with a malicious nature
Grey Hat = A Grey Hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards but does not have the malicious intent typical of a black hat hacker.
White Hat = A White Hat is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
Now here we have a
good list to guide you on how to become a hacker. Follow them and fulfill your
dream.
Operating Systems (Specifically Linux/Unix)
A true hacker
totally depends on open source and freeware. Also operating systems Linux/Unix
OS(s) are best to learn to hack and also to hack anything.
A hacker must have a
good knowledge of Linux Operating Systems like Red Hat, Kali Linux, Debian,
Black Box. It's very important to learn more than one Linux Operating System.
Programming
It is important for
a person in the hacking field to learn more than one programming. There are
many programming languages to learn such as Python, JAVA, C++. Free tutorials
are easily available online over the internet. Specifically, in the hacking
field languages like C++, Python, SQL, etc. are very important.
Cryptography
Now this is where
the things get interesting, you are a hacker and you are transferring files
over the internet to your pal and another hacker breaks in and takes your file and
now he knows everything, to prevent this you need to master the art of
cryptography. Look for a cryptography tutorial over the internet and learn them.
Networking Concepts
You
need to be good at networking concepts and understand how the networks are
created. You need to know the differences between different types of networks
and must have a clear understanding of TCP/IP and UDP to exploit loopholes in
a system. Understanding what LAN, WAN, VPN, Firewall is also
important. You must have a clear understanding and use of network tools such
as Wireshark, NMAP for packet analyzing, network scanning, etc.
Learn A Lot
Visit websites that
teach hacking and networking exploitation signup on hacking forum ask help to discuss with other hackers. Learn from expert hackers. Learn about phishing,
sniffer, Trojans, RATs, etc. Also, learn a good amount of batch programming and
shell programming.
Practice
After learning few
programming concepts or OS concepts sit and practice them. Set up your own
Hacker Lab with a good system with a good processor and RAM because your regular
system won’t handle hacking too smoothly.
Find/ Write
Vulnerabilities
Vulnerability is the
weakness or a loophole or open door through which you enter the system. Look
for vulnerabilities by scanning the system, network, etc. Try to write your own vulnerability
programs and exploit the system.
And always keep practicing; never stop learning. Cheers :)
Protection
In hacking industry, the most important thing is security, anonymity, and protection. Play cool and be
safe. There are numerous rules in the hacking area I’ll list a few of them.
- Don’t mess with the government. You may be a great hacker but hacking the government, not a good idea they will hunt you with
their best of best hacker and catch you so no government.
- Don’t mess with big international level or rich company. Again the rich douches will bring you down.
- Never hack or destroy a website supporting education for the poor, home for poor, or any program for backward countries,
you will be a disgrace and other hackers will level you to nothing.
- Don’t hack for personal gain. Fight for rights and seek information. Like Anonymous.
Methods of
Protection
Don't Use Microsoft Windows Operating System
Windows is full of
holes that can be exploited. These holes may allow spyware to infest,
completely overcoming all your anonymity efforts. Any good hacker avoids
Windows. Instead, they use security-hardened open-source operating systems,
such as Tails and Whonix.
Never
Connect To Internet Directly
Connecting to internet directly means giving away your privacy by showing you IP. Avoid anyone tracking down you’re real IP address through using VPN or Proxy. VPN enables users to create an encrypted private tunnel. Anyone attempting to trace from the internet site can only see the address of the VPN server, which could be a server located in any country around the world you choose.
Never Mail
Using Your Real Mail ID
Instead, use anonymous email services or remailers. Anonymous email services allow you to email, someone, without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it anonymously.
Avoid Using Google
Google makes track of everything you do in order to serve up adverts that you might click on. And as
useful as the search engine is, there are ways to get the best out of it
without compromising your identity. Services such as StartPage serve up google
results but don’t store IP addresses, cookies, or records of your searches. DuckDuckGo
provides a similar service.
An Advice
Learning is
essential to hacking. You must first learn then hack. You cannot be lazy. To
become a hacker you also need to read a lot. It’ll take you around 2-4 years of
learning to be a real hacker. If you think it's too much you shouldn’t be a
hacker. You need to spend at least 3-4 hrs a day with computers learning, I
don’t think it's too many computers that are really interesting I spend 2/3 of the
day with computers.
Now things are going
to be a bit serious here you have to decide do you really want it or
not, and if you want it how bad do you want it. Now as I’ve mentioned above
about Linux, it's very important for a hacker for all beginner hackers here I’d
recommend you to get yourself a Linux OS as for beginner I’d
recommend Kali, It good for both beginner and pro hacking you
can download it easily on google for Kali Linux and you can download it.
Now there are two ways you can run Kali or any other Linux OS
Regularly installing with a dual boot or boot using an SB Drive.
Here I’d recommend
USB Flashing because it is portable and convenient.
How to make USB Portable?
Download your Linux OS
Download tool which is given in the link |Link|
Install the Tool
Follow the tool and choose your Kali iso file
Choose your USB drive
Done
Now Linux OS
Is mostly command-based so you need to know some basic commands to operate it.
Example:
df
The command for
checking available disc space
Computer users are often known to check the availability and consumed
memory space over their systems for both the Linux and Windows desktop PCs. You
can easily check the amount of memory available over the disk at your Linux
system by simply typing the command of DF. It helps in offering you the status
of file system disk space over your Linux-based system.
df -h
du
Display disk space use by each file in the file system
Display disk usage by each file in Documents directory
du -h Documents
Display disk usage by the whole Documents directory
du – sh Documents
top
Display the top running processes on the system with memory and CPU utilization.
Display all top running processes
top
Display all top running processes from user fromdev
top -U fromdev
There are many commands but I can not put them in here but if you want a list of Commands please let me know in the comment section I will put the Command list as soon as possible.
What Is
Cryptography?
Cryptography is the
study and application of techniques that hide the real meaning of information
by transforming it into non-human readable formats or providing an extra layer
of protection to your stuff. The process of transforming information into a non-human readable form is called encryption. The process of reversing
encryption is called decryption. It’s just like a basic lock and
unlocks.
To illustrate it
have a look at the picture below
A plaintext is
encrypted using a key and becomes a Road Of Info Text and the same Road Of Info Text is
decrypted using the same key and becomes plain text.
The information
which is encrypted is known as Road Of Info.