LATEST: We are offering PENTESTING and WEB DEVELOPMENT service with low price Learn More

3/01/2012

WHERE TO BEGIN FROM HACKING???????

POST FROM: www.devilscafe.in
THNKS TO:
MINHAL MEHDI
slpqar.gif (142×28)
11hfigl.gif (350×19)
25qd3dt.jpg (350×19)




Introduction :
Today I'm here to explain what basic hacking is and what you will need to know.
I have seen a lot of users asking "How to hack" & "Where to start in hacking", so I decided to create a Post.
If you're a good learner then you should be able to catch on quick.
I'm going to try and make this have great details attached so that everyone will understand.

Pros & Cons :
Pros
  • Some software companies will hire hackers to check for flaws in there programs
  • Free things
  • Learning
  • Adrenaline Rush

Cons

  • Possible jail time
  • Fines
  • BlackHat Hacking is Illegal
  • Take's some time to learn

Getting Started :
First things first.
There are 3 type of hackers you can choose from.
Black Hat, Gray Hat, and White Hat.
Below I will list the definition for each of them.

Black Hat :
Black hatters, also known as crackers, are the ones who destroy private information, deface websites, and do most illegal activity.
Becoming a Black hat can be difficult if you're not willing to devote your time in learning.
Usually these people can not get a decent job because of the illegal activity.
Not of all them have bad reputation, but most of them do.
If you are caught by Law Enforcement than be expecting jail time.

Grey Hat :
Grey hatters are in between Black hat and White hat.
Most grey hat people commit pranks that they think is harmless to other users, but can be illegal also.
It's unlikely for some users to take it as a joke. Some might take it seriously if you go to far.
You can also suspect jail time if you're thinking about becoming a Grey hat.

White Hat :
White hatters basically use there knowledge to fight against malware. More than half of them are friendly & can be trusted.
I'm not saying trust anyone because there are some White hats, but it's more than unlikely for them to do harm to your computer.
White hatter can end up in a good paying job.
Such as computer programming & security consultant.
They most likely will not end up in jail if they do not do illegal activity.

Becoming a Hacker :
You must learn information about any operating system and/or programming language, this way you have some skill in the required fields.
Most people prefer Python for a coding language because you can create advanced programs.
There is no such thing as learning a "Easy language", it takes time & patients to master your goals.
You will be able to learn computer security, also known as exploits.

Learn a Programming Language :
Python is a pretty decent language to start with because it has a clean design, very organized, and easy for beginners.
It's not just a software to joke around with, it is very useful & powerful when creating an advanced project.
Java is also good but some people do not value it as a good language to start off with.

If you are well into programming then you might want to learn C.
It's the closest language related to C++ and is to the core of Unix.
It's helps a lot when creating a software but takes time debugging and is often not used because of that reason.

Perl is also good learning for practice reasons and is worth learning.
It is commonly used for web pages and system administration.
Other people use Perl to avoid programming in C.
Most computer jobs do not require C much often.

What's an Exploit :
An exploit is a piece of software and/or information that takes advantage of a bug or vulnerability in order to cause unintended behavior to occur on computer software.
This includes gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
Finding a bug can cause you to have further access into websites and software.

There are a bunch of methods on finding exploits.
The common found is a vulnerability in the creators software.
A remote exploit can work over a network and exploits the security vulnerabilities without access to the system.
A local exploit requires information before accessing the system.
It also increases the privileges of the person running the exploit past those by the system administrator.

Exploits clients also exist, usually using modified servers that send exploits when accessed with the clients application.
Exploits against applications requires some interaction with the user and is combined with a bit of social engineering.
This is part of the hackers way of gaining access into computers & websites for stealing information.

Normally a single exploit can take advantage of some software.
Often, when the exploit is released to the public, the creators will try and patch the bug.
Later they will release an update for customers to download.
This happens when the software is on the newer version.
The reason on why some black hatters don't publish their exploits is because of the patching method that is done by the creators, so they keep it to themselves or other hackers.

Earn Respect As a Hacker :

Program software & release it to the community with the source attached.
Design software that can be useful to everyone, this way users will download it & leave positive feedback.
Soon it will spread and you will start to become more known.

Test open-source software that users create.
If you can help them in any sort of way to make there software better & easy to use, I'm sure the creator will be thankful and mention you in the credits.
Try and find a program that is in the making.
Contact the creator and ask to beta-test it.
There's a good chance of you beta-testing it before it's released to the public.
You will also learn a lot this way and create good karma with others, so this way if you ever need help, they will offer you help as well.

Last but not least, give credit.
If you have had help in your current software than be sure to give credits.
Who knows, the person you're working with may give you a good ego.

Have fun!

What You Should Learn :

  • Learn advanced information about an operating system
  • Learn at least one programming language
  • Learn how exploits work
  • Do some research

About Author:

Hi, Its me Aamir Khan, Owner of HACKING ARTICLES. I am an Ethical Hacker, Pro Blogger, addicted Web Developer and Security Researcher with experience in various aspects of Information Security. I am from Pakistan.Hacking is my passion and i wanna myself to be called as a LEGEND in this field.

Follow him @ Twitter | Facebook


0 comments:

Post a Comment

Your feedback is always appreciated. We will try to reply to your queries as soon as time allows.
Note:
1. Make sure to click the "Subscribe By Email" link below the comment to be notified of follow up comments and replies.
2. Please "Do Not Spam" - Spam comments will be deleted immediately upon our review.
3. Please "Do Not Add Links" to the body of your comment as they will not be published.
4. Only "English" comments shall be approved.
5. If you have a problem check first the comments, maybe you will find the solution there.