Introduction of hacking and way of becoming a hacker.
Hey there ! Are you searching for learning hacking? You do not know where to start ? But if you mindset that you want to learn it and also want to move forward then this article might help you a lot with some direction. If you are a beginner and you do not know where to start then you are in right place for the instruction.
a. What is hacking?
First of all I want to start with a simple sentence. Most of the people after hearing the word “Hacking or Hacker” think that it is very bad and who are related to this word are bad people. But the universal truth is that “Hackers are the boss of digital technology” when it is related to the ultimate destination 0 and 1. Here 0 and 1 means the digital signal only which can be recognized in a computer system. Except this two numbers or digital signal status, computer is unable to recognize any other voice or words or anything. Now come to the point, Sometimes Hacking is the technique to break the security system and sometimes it is the process to find out the faults of a system that may be any networking system or software system or hardware system based on computer technology. So it is mainly the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose. Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc.
b. Who is the hacker?
The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker. They are the good programmer and they have strong knowledge on different programming knowledge especially in shell scripting with deep and dark networking methodologies and commands. They seek and exploit weaknesses in a computer system or computer network. Someone with an advanced understanding of computers and computer networks, and that cracker is the more appropriate term for those who break into computers, whether computer criminal (black hats) or computer security expert. So those are hacker who has advanced knowledge on computer technology and security with practical experience to break the securities of existing security mechanisms.
c. Who loves hacking?
This portion can be answered in two ways. One is, those who want to know about the computer technology in root level that means deeply they love hacking and another one is those who love challenges and security they love hacking. The purpose of hacking is not bad when it is used for security reason and testing with debugging the system. When a person works on a system and intends to know that system deeply from that expectation once he may intend to become a hacker. Good programmers are mainly encourage themselves to become a hacker when he works with a programming language many days. Once his unconscious mind raise some logic like “if I put this one instead of this one then what will happen?” and from there he may intend to become a security expert. I am saying about the initial level. But who are also expert in networking once they may intend to become a hacker such as when they works with operating system karnel modification and core networking devices commands.
d. Who hate the hackers?
Most of the people hate the hackers for their bad activities and stealing. Those who steals other’s personal information and money by illegal transaction and some other online accounts. Who breaks others system without any permission of the owners. For their bad nature they are hated by the people. When it violates people’s privacy it then criminal activities and there are many rules and regulations on that for punishment.
e. Who are the crackers?
Crackers are also known as hacker. It is important here to note that although hacking is used interchangeably with cracking, both are different. Both the activities are carried on with different objectives. In hacking, the attempt is to create something while in cracking the primary motive is to destroy something. Crackers are only mediocre hackers. A cracker is someone who breaks into someone else’s computer system, often on a network, bypasses passwords or licenses in computer programs, or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Cracking is generally less harmful than hacking. Crackers usually have an extensive knowledge in code related to Python and .NET (Visual Basic, C, C++, C#) and Objective C (Mac), while hackers are fluent in different forms of web code, like PHP, MySQL, Java Script , Ajax, and HTML and CSS.
f. Different types of hackers.
There are different types of hackers. But we can differentiate them into three one is (a) White hat hackers, second one is (b) Grey hat hackers and the third one is (c) Black hat hackers. They are differentiated by their activities. White hackers are also known as ethical hacker. They do not do any harm of the people. They are security researcher and also known as defender. They find out the bugs of different application and systems for fixing. They do not test any others property (application or system) without any permission of the owner. Sometimes they are hired by the people and honored by them. Grey hat hackers are in between of white hat hackers and black hat hackers. That means sometimes they play the role of white hat hackers and sometimes as a black hat hackers. They work security error fixers when needed and security system breaker as wish. But the black hat hackers are fully intended to do bad works. They try to get into others system or application through the bug and steal information do some bad works there such as deletion of files and do some misconfiguration and steal money via online illegal transaction. Black hat hackers are very clever because they have many risks.
g. Types of Hacking.
Different types of hacking is given below.
Hacking of website pages protected through password
Hacking into someone else’s computers while they are online.
Hacking of company servers.
Hacking of licence software.
h. How to start/where to start/ pre requisite of becoming a hacker
If you want to become a hacker then you have to mindset first. Then start learning about the computer system and day by day try to increase the programming knowledge. You must have strong knowledge on Assembly language to understand the computer system. How high level languages are understandable to a machine and how it works. Always keep in mind that the computer system never understands a single word without the true or false electric pulse 0 and 1. Such as when we press a character from computer it goes to microprocessor in digital signal. But how? you have to know that deeply to become a good hacker or security specialist. One simple example is when we press A from the keyboard it has numeric value which is called ACII value of 65. In the same way there are 0-255 total 256 values (character) in the whole computer system. So after press the capital A it get the value of 65 it converted to hex value then binary by the help of compiler or assembler. A = (65)10 = (41)16 = (01000001)2. So start learning machine language then any high level programming language and then read about the security system. This will guide you then step by step. Keep your eyes open in different forums and blogs. Keep in mind that as much as you become expert in algorithm development as soon as then you will able to learn quickly.
i. Decision making / where you want to see yourself after 5 years
The main thing is to setup your mind first. After 5 years where you want to see yourself. Think which position you would like to get. How you want to get admired by the others and become honored to become a security researcher? This single sentence can take you a long way. First decide yourself that you will stay with this or not? Where you want to see after 5 years and plan then.
j. Hacker’s language (Leet).
There is a special language for the hackers which are called leet. Leet (or “1337”), also known as eleet or leetspeak, is an alternative alphabet for many languages that is used primarily on the Internet. It uses some characters to replace others in ways that play on the similarity of their glyphs via reflection or other resemblance. For example, leet spellings of the word leet include 1337 and l33t; eleet may be spelled 31337 or 3l33t.[Source https://en.wikipedia.org/wiki/Leet ]. You can take the help of this site to convert general language to leet language http://www.1337.me/. Also leet language is available on facebook. You may have a look on the language section and change it to leet and enjoy.
2.Starting up your hacking
a. Different paths / Know your Routes
But be aware that you won’t reach the skill level of a hacker or even merely a programmer simply by accumulating languages — you need to learn how to think about programming problems in a general way, independent of any one language. To be a real hacker, you need to get to the point where you can learn a new language in days by relating what’s in the manual to what you already know. This means you should learn several very different languages.Learning to program is like learning to write good natural language.
Yes, there are other operating systems in the world besides Unix. But they’re distributed in binary — you can’t read the code, and you can’t modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast.
Under Mac OS X it’s possible, but only part of the system is open source — you’re likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple’s proprietary code. If you concentrate on the Unix under the hood you can learn some useful things.
Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can’t be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. (This wasn’t always true, and some old-time hackers still aren’t happy about it, but the symbiosis between Unix and the Internet has become strong enough that even Microsoft’s muscle doesn’t seem able to seriously dent it.)
So, bring up a Unix — I like Linux myself but there are other ways (and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code.
After that try to understand some important thing of Networking devices like CISCO Juniper and other firewalls and beside this you must have knowledge on web application firewall (WAF).Various networking devices configuration and deep understanding on network technology.
b. Which one you should start first?
Go step by step that I mentioned in the above section. Hope that will guide you in a proper way. Start learning programming->some web topologies and technologies->Start learning Networking then Read about security server hardening.
c. Start Your Programming.
My suggestion is for the beginners to learn python first and do some projects then when you will acquire enough knowledge on it you can easily move to any other language. But python is very easy to learn and it is strongly recommended for the hackers. You will be able to learn and write your own shell script in python and also in PHP. Other languages are also suite as well from their position.
d. Test your Application or learn Software testing.
If you want to learn from sketch so then it is better to start from the unit testing or software testing. Software testing or unit testing will give you a good logical development and concept about the functionality of software. This will help you in future about building packages and software’s and functionality. This encourages developers to modify the source code without immediate concerns about how such changes might affect the functioning of other units or the program as a whole. Once all of the units in a program have been found to be working in the most efficient and error-free manner possible, larger components of the program can be evaluated by means of integration testing.
e. Learn Assembly language for better understanding / How 0, 1 goes to processor?
If you want to go deeply to hacking then you must have good skill on Assembly Language programming. Sometime it may seems to you that this is very old language and unnecessary but the main fact is without knowing you can’t go deeply to programming and computer machine learning. This will exactly change your concept of computer learning. Not only learning but also it will inspire you to be habituated with command line interfacing in future while you will move to linux or any other unix system.
f. Learn about a complete IT environment. Internet, Computer, OS, Server, DNS, Application, Routers
To know about hacking deeply you must have good knowledge on an IT environment. How the environment setup.That mean from ISP internet connection to router then firewall then various distribution switches and VLAN also bandwidth controller and many more. They provide static IP or DHCP IP to their host or not? Is anything is shared on the local LAN or WAN or globally. Any kinds of transactional system in that environment or not? Where the servers are placed under the firewall or any separate DMZ Zone? They are using any private IP by NAT with public IP or not? Where the applications are placed? Which operating system are being used by the system and which version beside this you may search for router configuration various backup files for many important information’s. This types of information will help you much more to track the system.
g. Next future step from basic learning
After learning these basics steps then you have to go ahead to the deep level of networking and programming. Then you should practice about the different karnel modification of different open source operating systems. Basic understand of programming to deep level to modifying the karnel of the operating system. Then you can go for the DOS command and some basic commands of unix based systems. This will help you in future a lot. When you enter into the deep level of hacking then you must have to habituate of command line. Without the practice of command line you will not be able to do better in hacking. So this is my advice to you that start practice of DOS command but it is better if you can adopt you with the unix based operating system. As soon as possible left windows operating system and start with unix based system. As you are newbie so that you can start with Ubuntu Operating system this operating system provide you both UI based and command line based utility and very easy to learn for the newer.
h. Work simultaneously
For better result use many operating systems within one computer and work simultaneously. Different operating system has different utility. For some tools you must have to use Windows based operating system and for some tools you must have to go for Linux based operating system.Never depend on a single operating system. Depending on your requirement you have to move one operating system to another operating system. Never bind yourself with one.
i. What are the requirements for becoming a system analytics?
If you have any idea about a system analyst then this will help you a lot. An individual in charge of designing, modifying, or analyzing various systems to ensure compatibility and user effectiveness. System analysts may work independently, but are often part of a larger information technology unit that keeps technical aspects of a company running smoothly. System analysts do not focus on hard-coding, but more on evaluating the code and making suggestions.
j. Hacking environment setup
After acquiring knowledge on the above mentioned topics you may now go for the environment setup for start your own pen testing. Welcome to the starting on practical. From now rest of the part I will talk about the practical part. But the above theory is not enough to learn. Keep your eyes open and adopt yourself with the new technology. Keep yourself up to date. Encourage yourself always to learn a thing very deeply. It is better to be master in one topic than acquiring knowledge on many topics slightly. I will go through the process both in Windows operating system and linux. So prepare yourself to run with me. First choose a good computer which has Good memory capacity and good processing capability. This is very important because I will use some tools for testing that are very heavy and need more memory to execute.
Now run the windows operating system and first install Java in it. Then install python for windows. It is highly recommended to use x64 bit windows operating system. Install putty, WinScp, Tor Browser, Mantara Mrowser, Hackbar plugin for browser and firebug plugin. Then install filezilla on it. XAMPP or WAMPP for localhost to make your own computer as virtual server to run some server side codes.Such as for shell code to understand it deeply.Make the computer IIS server ready for run ASP codes. Search on google if you do not understand how to do that.
Now go to your web browser and download and install kali linux for linux based operating system. Kalilinux is a strong and highly recommended operating system for the hackers. You may use any other unix based operating system but in kali linux many tools are pre-installed and configured. But if you use any other one then you have to install tools manually and configure. So if you are familiar with other unix based operating system then you can use that. Also then install mantara browser and hackbar there. After doing that you are now ready for the basic operations.
3. Some Hacking Topics
Networking is the most essential part of computer technology.A network is defined as a group of two or more computer systems linked together. There are many types of computer networks, including the following:
- Local-area networks (LANs): The computers are geographically close together (that is, in the same building).
- Wide-area networks (WANs): The computers are farther apart and are connected by telephone lines or radio waves.
- Campus-area networks (CANs): The computers are within a limited geographic area, such as a campus or military base.
- Metropolitan-area networks MANs): A data network designed for a town or city.
- Home-area networks (HANs): A network contained within a user’s home that connects a person’s digital devices.
In addition to these types, the following characteristics are also used to categorize different types of networks:
- Topology: The geometric arrangement of a computer system. Common typologies include a bus,star, and ring. See the Network topology diagrams in the Quick Reference section of any good reference of good books.
- Protocol: The protocol defines a common set of rules and signals that computers on the network use to communicate. One of the most popular protocols for LANs is called Ethernet. Another popular LAN protocol for PCs is the IBM token-ring network.
- Architecture: Networks can be broadly classified as using either a peer-to-peer or client/server architecture.
- Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.
b. Software cracking
Software cracking means crack serial number or use the trial version for lifetime. Learn Assembly programming. In order to crack most software, you will need to have a good grasp on assembly, which is a low-level programming language. Assembly is derived from machine language, and each assembly language is specific to the type of computer you are using. Most assembly language is expressed through binary and hexadecimal.