Advertisements

Showing posts with label How to become a hacker. Show all posts
Showing posts with label How to become a hacker. Show all posts

Thursday, December 27, 2018

How To Become A Hacker: Steps By Step To Pro Hacker|| beginning guide

Here are some guidance to start learning ethical hacking as a beginner.




Learn To Program In 'C':

C programming being one of the most powerful languages in computer programming. It is necessary to really master this language. This programming language was invented by Denise Ritchie  in between the years 1969 and 1973 at AT&T Bell labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic.

There are hundreds of Free C Programming PDF & tutorial available on web to learn. However I would recommend you to start with a simple and well written C.

Know more about 'C'
Know the basic structure of 'C'

Learn More Than One Programming Language:

When you are trying to become a hacker. It is very important to learn other modern computer programming languages such as JAVA. Perl. PHP and Python. One of the best ways to learn these is by reading books from experts. It will also help to know about markup languages like XML. HTML and data format such as Json. Protobuf and others which are common way to transfer data between client and server.

Know about 'Python Programming Language'

Learn UNIX:

UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell labs. The best way to learn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without learning UNIX but it is not possible for you to be an internet hacker without understanding UNIX.

If you have not used Unix operating system yet a few essential Linux commands will make your comfortable in get getting quickly started.

Learn More Than One Operating Systems:

There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems hence it is good to learn hacking Microsoft systems. Which are closed source system.

According to the National Vulnerability Database. Microsoft operating systems have a large number of vulnerabilities . Learn about Operating System

Windows OS installers are distributed in binary therefore it is not way for you to read the code. Binary code is basically the digital representation of text and data.

Learn Networking Concepts:

The networking concepts needs to be sharp when you want to be a hacker.

Understand how the network are created important however you need to know the difference between different types are networks. Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web

Understand what is sub net. LAN, WAN and VPN. Know about Networks LAN, WAN

I recommend Computer Networking : A Top Down Approach By James F. Kurose and Keith W. Ross.

Start Simple: Read some tutorials About Hacking:

This is the simple and best way to start. Read as many tutorials as possible that are meant for hacking. These article will give you insight and help you develop the attitude to be a hacker. Some tutorials will initiate you with N map. Nessus and Super Scan, some of the hacking programs or tools that hackers generally use. These tutorials are readily available over the internet : Both text and video tutorial are available for you to answer your question how to be a hacker.

Learn Cryptography:

As an expert hacker you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for Internet and networking. It is the practice and study of techniques that are used for secure communication in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data integrity of the data and authentication. Moreover, the technology of cryptography is extensively used in ATM cards. Computer passwords and E-commerce. While hacking these encrypted code needs to be broken. Which is called decryption.