Skip to main content

How to become an ethical hacker

How to become an ethical hacker





Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let’s change that!
This Post is for the people that:
  • Have No Experience With Cybersecurity (Hacking)
  • Have Limited Experience.
  • Those That Just Can’t Get A Break
OK, let’s dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many emails on how to become a hacker. “I’m a beginner in hacking, how should I start?” or “I want to be able to hack my friend’s Facebook account” are some of the more frequent queries. In this article, I will attempt to answer these and more. I will give detailed technical instructions on how to get started as a beginner and how to evolve as you gain more knowledge and expertise in the domain. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend’s Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. It's time to change the color of your hat 😀
I’ve had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have. -MakMan

Introduction!

First off, let’s just agree that saying ‘a Career in Cybersecurity’ is a bit like saying ‘a Career in Banking’, i.e. it’s an umbrella term that incorporates dozens of niches within the industry. In Cybersecurity we can, for example, talk about digital forensics as a career, or malware/ software detecting, auditing, pentesting, social engineering, and many other career tracks. Each of these sub-categories within cybersecurity deserves a separate blog post, but, for the purposes of this piece, let’s focus on some important generic requirements that everyone needs before embarking on a successful career in IT Security.
If you have no experience don’t worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let’s get this party started.

1. What is hacking?

Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker has official permission in a lawful and legitimate manner to assess the security posture of a target system(s).
There are some types of hackers, a bit of “terminology”. 
White hat — ethical hacker. 
Black hat — classical hacker, get unauthorized access. 
Grey hat — a person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — a person with no technical skills just used pre-made tools.
Hacktivist — a person who hacks for some idea and leaves some messages. For example strike against copyright.

Actually, a goal of ethical hacking is to reveal the system weaknesses and vulnerabilities for a company to fix them. Ethical hacker documents everything he did.

2. Skills required to become an ethical hacker.

First of all to be a Pentester you need to be willing to continuously learn new things on the fly and or quickly at home. Secondly, you need to have a strong foundational understanding of at least one coding/scripting language as well as an understanding of Network and Web Security.
So here are some steps if you want to start from now…
  1. Learn To Code (Programming).
  2. Understand basic concepts of Operating System
  3. Fundamentals of Networking and Security
  4. Markup and as many technologies as you can!

3. What Platform To Code In:-

That depends on what platform you’ll be working on. For web applications, I suggest you learn HTML, PHP, JSP, and ASP. For mobile applications, try Java (Android), Swift (iOS), C# (Windows Phone). For desktop-based software try Java, C#, C++.
I would like to recommend Python as well because its a general purpose language and getting more popular nowadays due to its portability.
But what really is necessary for every programming language is to learn the fundamentals of programming, concepts like the data types, the variable manipulation throughout the program at the OS level to the use of subroutines aka functions and so on. If you learn these, it’s pretty much the same for every programming language except for some syntax changes.
ProTips:-
  1. To be an expert at any programming language, understand the OS level operations of that language (varies in different compilers) or learn assembly language to be more generalized
  2. Don’t get your hopes high if you can’t achieve results in a short span of time. I prefer the “Miyagi” style of learning. So keep yourself motivated for what comes next.
  3. Never underestimate the power of network and system administrators. They can make you their *hypothetical* slave in a corporate infosec environment 😀

Comments

Popular posts from this blog

Top 10 Things to Do After Installing Kali Linux

Top 10 Things to Do After Installing Kali Linux Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly customizable. This makes personalizing your penetration testing distribution a bit daunting. With just a few commands, we can automate tasks, install our favorite software, create additional user accounts, properly configure anonymity software, and optimize our interactions with terminals. There are just a few things we can do to improve our interactions with the operating system. apt-get install git 2 Configure Bash Aliases Bash aliases are fantastic for creating customized command line shortcuts. For example, we can reassign the  ls  command to automatically use our favorite arguments. Below is an example of a normal  ls  output. l...

Top 10 Hacking Movies of All Time

Hollywood's depiction of PC programmers is infrequently precise, however, the idea has prompted the absolute most prominent, activity-stuffed motion pictures ever. Following are ten of the best programmer-related Hacking Movies we could discover.  The Matrix (1999)  The Matrix is seemingly one of the most notable science fiction programmer films ever. The fundamental person, Neo, is a software engineer who unintentionally finds that the whole world, as far as he might be concerned, is just a PC program. Tragically for people, the program's plan subjugates humankind. Neo and a little gathering of alert and mindful people escape from the Matrix, yet they observe themselves to be almost feeble against the world's customizing.  Eagle Eye (2008)  Eagle Eye is an activity-pressed film that follows two outsiders who are both after orders from an obscure source. The source seems to have hacked into and dealt with ledgers, traffic signals, cell phones, and even electrical cab...

All time Best hacking app for android

Android is presently perhaps the most famous working system. Thus, programmers have additionally begun utilizing Android gadgets for their assignments. Presently Android gadgets are utilized for infiltration testing and other hacking exercises including IT security manager, Wi-Fi hacking, and network checking. There are a few hacking applications or Android gadgets. Along these lines, we have curated a rundown of the best hacking applications for Android.  Before you begin utilizing these applications, you should take a reinforcement of your significant information. I additionally suggest the utilization of these applications on a different gadget. Utilizing this on your essential telephone isn't suggested. It is because a considerable lot of these applications require an established gadget and the application can likewise hurt your telephone.  Note: Hacking applications can be utilized for instructive and vindictive purposes. Yet, we never empower noxious activities. We are p...