How to begin Hacking? How to become a Hacker? - Technic Hubs

Technic Hubs

Technic Hubs aims in providing hands-on experience on Machine Learning, Augmented Reality(AR), Virtual Reality(VR), Django(Web Development), Flutter and React(App Development), Internet of Things(IoT) with videos on Nepali.

Breaking

Saturday, March 31, 2018

How to begin Hacking? How to become a Hacker?

How to begin hacking?




How to become a Hacker?

Blackhat hacking techniques do not differ from any other type of hacking. Learning hacking is learning white hat hacking. You won't be able to attack other servers from the first day. Withoutthe experience you will probably make a bunch of mistakes that can end you up in jail. Having said that I can now tell you how to start learning to hack.

I am going to be specific. First of all, you need to learn HTML. Why? Because it is extremely easy (itwill take less than a week) and every web page is written in it. However, you cannot hack with it.

The only thing you can do is change password fields to text fields which might come in handy one day.

After you learn that, learning a little bit of CSS will be great. You can set up phishing pages with

HTML/CSS. Then you can proceed to learn basic javascript. With javascript & HTML together you can hack inputs. It’s called Cross-site scripting ( XSS) and it is when you input javascript code inside a web page.

After that learn SQL and PHP to understand how databases and back-end web developing works. If you can understand how something works, you can try and penetrate it. With SQL you can do SQL injections, which is a very popular and dangerous technique to leak databases and passwords. With PHP you can create malicious web virus to infect a server/website. You can already do web hacking
now. It’s a huge part of hacking, but it’s not just that.


You now have to learn UNIX and LINUX commands. They are essential in hacking. Download a Linux distribution of your choice. Beginners tend to use Ubuntu and Linux mint but I personally prefer Debian. After installing your Linux you can open the terminal and learn the commands. Simple commands such as cd, ls, mkdir, cat, cp, rm and tools such as nano/pico are very useful in hacking.

After making yourself familiar with the command line interface you can move on.

Now, it’s time to create your own automatic tools. Learn Python. It’s simple. A simple tool you can create for start is create a tool that you put information of somebody in and it creates a list of all the possible passwords based on the information and export it in a text file. There are much penetration testing (hacking) tools on Github where you can get ideas from and read the source code of. With Python you can also learn to write your own exploits.


 Then try to learn the basics of C/C++. It’s really powerful and you might have a hard time learning it and connecting libraries and all that but it is worth it, to say the least. A tip to learning programming: Don’t be afraid to try new things. When I start to create a tool I have no idea how I am going to do it.

I search for everything the last moment. Because I’m sure of myself and I like challenges. You should be like that as well. You want to make a tool that gets the IP of a website’s server? Do it. Search it and learn how. Now we’re going to a different part of hacking: Social engineering. It’s phishing, scamming and fraud - and they are very useful.

Learn to do hacking from LAN. It’s much more adventurous and exciting. Through the same router,

you can do things such as DNS spoofing to further the possibility of somebody falling for your phishing page. Now feel free to download your first penetration testing Linux distro. Preferably Kali Linux! Imagine it - An OS full of hacking and penetration testing tools that you can use for free.

Some good tools used frequently by hackers are Metasploit, Nmap, Burp suite, SET, ghost phishing, THC Hydra, John the ripper, sqlmap, SQL injection, Aircrack ng, Wireshark, ettercap, SQL ninja and many many more. Are you clear how to begin hacking? Else have your thoughts below.
First Social Engineering attack

1 comment: