Actually being a hacker is not an easy thing. But this article will provide some of the most important steps to becoming a hacker. This article will focus on the skills and attitudes needed to become a professional hacker. infiltrating the security system and getting into the system is not the only ability of a pro hacker.
|Become Professional Hacker|
Tireless and pure attitude is the two pillars of becoming a master hacker. Knowledge of various computer science topics is needed, but knowing the big things hidden inside is the key to becoming a successful hacker.
Therefore having high learning motivation is very important in the course of learning to become a hacker.
Stages of How to Become a Professional Hacker Here is a step-by-step guide to “How to Become a Hacker” that I have summarized and through research before I publish it to the public:
Step 0: Read the book The Hacking Manifesto
This is not an easy task to become a hacker. As a hacker, you must have an attitude and curiosity. Reading manifestos can teach the attitude of hackers. Maintaining a hacker attitude is about developing competence in language rather than having a stereotypical attitude.
Although many people assume that hackers are criminals. But in real life, they are employed by large companies to protect information and minimize potential damage. The act of hacking is actually quite an over-curiosity and playing with authority. As a potential hacker, you must be determined to violate authoritarian rules, confidentiality, and censorship. Fraud is another warehouse that will allow you to avoid spying.
The act of stealing something or injuring someone cannot be called hacking. People commonly called crackers in the community. Crackers are involved in illegal activities and I will not recommend you to be involved in these activities.
Step 1: Learn Programming Language C
C Programming is one of the most important languages in computer programming. It is very necessary to be truly a hacker. This programming language was created by Denise Ritchie between 1969 and 1973 at AT & T Bell Labs. C programming will basically help you divide tasks into small pieces and these pieces can be expressed in the order of orders.
There are Millions of free e-book Programming C guides & tutorials available on the internet to study, but I would recommend you to start with simple c-book programming and well-written my choice and then read this book (C Programming Language By Brian W. Kernighan and Dennis M. Ritchie), but unfortunately this guide in English, so those of you who don’t understand English must first translate it into Indonesian, to understand the real power of language c, this book is not easy to understand but you should read this book to get a deep understanding of C Programming language.
Step 2: Learn More Than One Programming Language
When you try to become a hacker, it is very important to learn other modern computer programming languages such as Java, Perl, PHP, and Python. One of the best ways to learn the language is to read books from experts. It will also help to know about markup languages such as XML, HTML and data formats such as JSON, Protobuf, and others which are common ways to transfer data between clients and servers.
Java is one of the most popular programming languages. many companies claim that java is also very safe. security models Knowing Java will empower you to understand how this language achieves security. Learn about security hole loops in the Java language and related frameworks. Choose and read from various free PDFs, tutorials and e-books available to learn java online.
Perl is a general-purpose dynamic programming language, which is a high level and can be interpreted. This language borrows several features of the C language. On the other hand, JAVA is a concurrent, class-based and object-oriented programming language. Python is really useful when you try to automate several repetitive tasks.
HTML is a language mark up that is based on web pages designed, created and displayed. The web browser reads the HTML code to display web pages.
Python is the best language for web development and favorite language for many programmers because of its simplicity. Many people use Python to do simple and complex automation.
Step 3: Learn UNIX
UNIX is a multi-tasking and multi-user computer operating system designed to provide good security for the operating system. UNIX was developed by several employees from AT & T at Bell Labs. the best way to learn UNIX is to try opensource OS (for example CentOS) and install/run on your own computer. You can operate the internet without learning UNIX, but it is not possible for you to become an internet hacker without understanding UNIX.
If you have never used the Unix operating system at all, some important Linux commands will make you comfortable in getting new knowledge.
Unix in a Nutshell by Arnold Robbins is a good way to find out about the ins and outs of Unix. This book will teach you how to use Unix.
The next thing you need to know is the internal operating system. I recommend the
Design of the UNIX Operating System by Maurice J. Bach to get an in-depth understanding of the Unix operating system.
A number of large web servers that are hosted on Unix-based servers and know that the internal operating system will be really a big boost in mandatory skills about how to become hackers.
Step 4: Learn More Than One Operating System
There are many other operating systems besides UNIX. The Windows operating system is one of the most problematic systems, so it’s good to learn to hack Microsoft systems, which are based on closed or closed systems.
According to the National Vulnerability Database, Microsoft operating systems have a large number of vulnerabilities.
The Windows OS installer is distributed in binary, therefore it is not easy for you to read the code on the Windows system. Binary code is basically a digital representation of text and data that is only understood by computers. However, know how programs are written for Windows systems.
One new vulnerability of the most popular OS is that the Java Web Start application can be launched automatically even if the Java plug-in is disabled. How to become a hacker is about knowing the weaknesses of the operating system and targeting them systematically.
Step 5: Learn the Network Concept
The concept of networking is needed when you want to be a hacker.
Understanding how networks are created is important, but you need to know the differences between different types of networks. Having a clear understanding of TCP / IP and the UDP protocol is a must to be able to exploit vulnerabilities on the world wide web.
Understand what is subnet, LAN, WAN, and VPN.
The network command to make HTTP requests is very necessary at your fingertips. HTTP protocol is the gate that someone goes through to enter the internet world. Therefore it is necessary to learn this protocol to break barriers. Hackers often use HTTP gateways to violate security systems and take control of them.
Apache HTTP is one of the most commonly used web servers and knows the contents in Apache and out of it will empower you on any HTTP or business related to other application layer protocols.
Nmap is a powerful network scanning tool used by professional security hackers around the world to identify vulnerable hosts. However, to effectively start using it you must understand the basics of the network. To get advanced skills on Nmap you can refer to books by the creators of the Nmap Scanning Network: The Official Nmap Project Guide to Network Discovery and Security Scanning.
Step 6: Start with the Simple Things Read Some Tutorials About Hacking
This is a simple and best way to start becoming a professional hacker. Read as many tutorials as possible for hacking. This Namina article will provide insight and help you develop an attitude to become a hacker. Some tutorials can be started from Nmap, Nessus, and SuperScan, some hacking programs or tools commonly used by hackers. This tutorial is widely spread on the internet, available in the form of text and video tutorials that will answer all questions in your mind to become a hacker.
Step 7: Learn Cryptography
As an expert hacker, you need to understand and master cryptography. Cryptography and encryption technology is very important for the internet and networks. This is a practice and technical study that is used for safe communication in the presence of third parties. encryption is carried out for various aspects of information security such as data confidentiality, data integrity, and authentication. In addition, cryptographic technology is widely used in ATM cards, computer passwords, and e-commerce. While hacking, encrypted codes need to be broken down, called decryption.
Cryptography is widely used in SSL-based internet communications. An expert hacker must be able to understand how SSL works and what is the importance of cryptography in keeping SSL secure.
Try reading about various encryption algorithms and see why they are difficult to decrypt. Participate in challenges to decrypt strong encryption. An expert hacker will be able to show weaknesses in the encryption algorithm and must be able to write a program that can show how decryption can be done without a lot of key information.
Understand the various techniques used for password cracking. There are dozens of tools available for password cracking. Being an expert on hacking is important to understand how to create a program that can crack passwords from text from scratch.
Step 8: Try A Lot
This is an important step to establish yourself as an expert hacker. Setup your own laboratory to experiment learning in practical applications. A simple laboratory filled with your computer. After progress, you might want to add more computers and hardware needed for the experiment.
It’s good to try experimenting on a personal computer, where you can fix it if you make the slightest mistake. Many hackers initially started by downloading virtual lab applications such as Oracle VirtualBox. but you need at least 3GB of RAM on a computer and a relatively high processor spec to be able to do hacking experiments at Oracle. Setting up a virtual machine is very important because it will allow you to test viruses, applications, and servers without affecting the performance or file system of your own PC.
Some things you might need to remember when doing an experiment:
- Save backup/backup data before trial.
- Starting from the smallest thing.
- Know when to stop.
- Document the progress of the experiment.
- Continue to improvise.
- Automate repetitive tasks.
Step 9: Read Some Books from the Expert
Reading will always increase your knowledge. Try to read as many books and articles as possible written by experts in the field of ethical hacking and company security.
Reading a lot about everything that is related is very important in the world of hackers that you must also consider increasing the speed of reading. If your reading speed is slow then you might not get a fast progress in this field.
When reading a lot, it’s also important to know that the majority of content on the web is not worth your time. Many people use SEO tricks to attract traffic but have little value contained in it. If you see an article in seconds and decide not to read it, it will save a lot of time reading some content that really needs to be well researched.
Step 10: Participate in Hacking Challenges
Regular participation in hacking challenges that can help you learn more and sharpen your knowledge. There are several companies that regulate this challenge in order to check the vulnerability of their software products. The most common hacking challenges include breaking software security systems and taking control of third-party computer systems. In addition, there are several websites listed below that have up-to-date challenges that offer hacking online.
Step 11: Write down the vulnerability that you found
Program vulnerability is a program weakness. This is a good approach to find out the vulnerability of existing programs and share with others. In this way you will have the choice to gather a variety of opinions from different sources, allowing you to hone the skills that you have achieved now.
Examples of computer vulnerabilities include security breaches, input validation errors, privilege bugs and also user interface failures. For example, Microsoft Internet Explorer 11 has a bug vulnerability in the preview version that makes some hackers use it.
Identifying new weaknesses in any software is the real work every expert hacker will definitely do.
Step 12: Contribute to Open a Security Source Project
Contributing to an open-source computer security project is a good platform to test your abilities. This is not everyone can. Many organizations like Mozilla and Apache offer types of open source projects. Try to be part of this project and add valuable contributions to the interests of the community.
Participate in open sources security projects such as anti-spam, anti-virus, firewalls and data removal that help you improve agility as a pro hacker.
Contribute through finding vulnerabilities that you find to the global vulnerability database and give them back to the community.
Remember it doesn’t matter if your contribution is very small, as long as you participate and add value it will definitely help.
Step 13: Continue Learning
The key to success about being a hacker is to continue learning. Reading blog hacking available on sites such as hacker factor blogs and IKEA hacker blogs, participating in forums such as hackforums.net and elite hacking is a great way to refresh your knowledge as a hacker. Online video forums such as TED or Techtalk are good sources for knowing more about the new emerging hacking techniques and the technology that is being used. You also have to try to follow the writings of famous hackers like Adrian Lamo, Kevin Mitnick, Kevin Poulsen, and Robert Tappan Morris.
The above are some complete steps that Namina summarizes about procedures for how to become a hacker and help you become an expert hacker. However, you must be a responsible and selective citizen, ensuring you do not use these skills for violations of security from important institutions because it can make your life in trouble. You also have to always remember, for every hacking tool, there is always a counter hack tool. Therefore, being a smart hacker is more important than being a responsible hacker. Thank you and hope it is useful.