Hacking Definition: Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.Many of my people have written to me asking the same thing. “What skills do I need to be a good hacker?“.As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great hacker, one must master many skills. Don’t be discouraged if you don’t have all the skills I list here, but rather use this list as a starting ground for what you need to study and master in the near future.There are some skills you need to have and study to be a hacker if you really want to learn hacking:-
1.Basic Computer Skills
Having a good understanding of a computer, its components, and how it works is essential for anyone, not just hackers.It probably goes without saying that to become a hacker you need some basic computer skills. These skills go beyond the ability to create a Word document or cruise the Internet. You need to be able to use the command line in Windows, edit the registry, and set up your networking parameters.
Many of these basic skills can be acquired in a basic computer skills course like A+.Make it a goal to read computer books that cover your interests. Visiting popular online bookstores, such as Amazon, and browse through the top 100 books on your subject is a great place to start. Audible has an enormous selection of e-books, if you prefer that method of reading.
You need to understand the basics of networking, such as the following.
- Public v Private IP
- Routers and switches
- OSI model
- MAC addressing
As we are often exploiting these technologies, the better you understand how they work, the more successful you will be. Note that I did not write the two guides below, but they are very informative and cover some of the networking basics mentioned above.
3.Build a computer
If you want to learn more about the hardware aspect of a computer, there is nothing more educational than putting one together. Not only will this help broaden your knowledge of computer hardware, but can help with diagnosing hardware problems, and teach you more about how computers work. There are plenty of websites with instructions on how to build your own machine.
4.Wireshark or Tcpdump
Wireshark is the most widely used sniffer/protocol analyzer, while tcpdump is a command line sniffer/protocol analyzer. Both can be extraordinarily useful in analyzing TCP/IP traffic and attacks.
- An Intro to Wireshark and the OSI Model
- Wireshark Filters for Wiretappers
5.Pick up a programming language
Learning how software works by studying a programming language is an invaluable tool. It teaches you how to create your own programs, and how to debug them. It also gives you a better understanding of how programs work.
If you want to Hack Web Site then you must know following programming languages.
If you want to learn writing Exploits then you must know
- C programming
- Python (Highly recommended)
And if you want to learn Reverse Engineering (Software Cracking /Hacking)then you must learn Assembly language, the one and only Assembly nothing but Assembly.
Most scripts for script kiddies are done in Python lately. Python is the new BASIC, I like it. And it works. It’s good for you to test something, to prototype, to hack.
But then you have to get shit done. And you can’t do that in Python. You will need heavy skills in C/C++ and also deep knowledge in system programming and the inner workings of your machine and operating system.
Also, learning scripting languages such as Perl and PHP and even the basics of HTML web design, are advantageous for anyone interested in setting up and tweaking websites.
If you need more experience with programming, creating your own open source project or helping with another open project can be a helpful learning experience. Creating your own website can also be another great learning experience as it shows the details behind website design and setup.
6.Security Concepts & Technologies
A good hacker understands security concepts and technologies. The only way to overcome the roadblocks established by the security admins is to be familiar with them. The hacker must understand such things as PKI (public key infrastructure), SSL (secure sockets layer), IDS (intrusion detection system), firewalls, etc.
The beginner hacker can acquire many of these skills in a basic security course such as Security+.
In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies.
To get started, check out my guide below on getting started with wireless terms and technologies, then read our collection of Wi-Fi hacking guides for further information on each kind of encryption algorithms and for examples of how each hack works.
- Getting Started with Wi-Fi Terms & Technologies
- The Aspiring Hacker’s Guide to Hacking Wi-Fi
The Intermediate Skills
This is where things get interesting, and where you really start to get a feel for your capabilities as a hacker. Knowing all of these will allow you to advance to more intuitive hacks where you are calling all the shots—not some other hacker.
Without scripting skills, the hacker will be relegated to using other hackers’ tools. This limits your effectiveness. Every day a new tool is in existence loses effectiveness as security admins come up with defenses.
To develop your own unique tools, you will need to become proficient at least in one of the scripting languages including the BASH shell. These should include one of Perl, Python, or Ruby.
If you want to be able to proficiently hack databases, you will need to understand databases and how they work. This includes the SQL language. I would also recommend the mastery of one of the major DBMS’s such SQL Server, Oracle, or MySQL.
- The Terms & Technologies You Need to Know Before Getting Started
- Hunting for Microsoft’s SQL Server
- Cracking SQL Server Passwords & Owning the Server
- Hacking MySQL Online Databases with Sqlmap
- Extracting Data from Online Databases Using Sqlmap
Web applications are probably the most fertile ground for hackers in recent years. The more you understand about how web applications work and the databases behind them, the more successful you will be. In addition, you will likely need to build your own website for phishing and other nefarious purposes.
To become good hacker, you must not be caught! You can’t become a pro hacker sitting in a prison cell for 5 years. The more you know about digital forensics, the better you can become at avoiding and evading detection.
The beginner hacker must understand TCP/IP basics, but to rise to the intermediate level, you must understand in intimate details the TCP/IP protocol stack and fields. These include how each of the fields (flags, window, df, tos, seq, ack, etc.) in both the TCP and IP packet can be manipulated and used against the victim system to enable MitM attacks, among other things.
Although one doesn’t need to be a cryptographer to be a good hacker, the more you understand the strengths and weaknesses of each cryptographic algorithm, the better the chances of defeating it. In addition, cryptography can used by the hacker to hide their activities and evade detection.
There is ALWAYS a way to hack a system and many ways to accomplish it. A good hacker can think creatively of multiple approaches to the same hack.
- Null Byte’s Guide to Social Engineering
- CryptoLocker: An Innovative & Creative Hack
A hacker is always coming up against seemingly unsolvable problems. This requires that the hacker be accustomed to thinking analytically and solving problems. This often demands that the hacker diagnose accurately what is wrong and then break the problem down into separate components. This is one of those abilities that comes with many hours of practice.
A hacker must be persistent. If you fail at first, try again. If that fails, come up with a new approach and try again. It is only with a persistence that you will be able to hack the most secured systems.