THE ULTIMATE GUILD FOR ETHICAL HACKERS

THE ULTIMATE GUILD FOR ETHICAL HACKERS


 1. GET HANDS ON LINUS/UNIX

the open source operating system linux / unix, ensures better security for computer system.

as an ethical hacker you should be well versed with linux as it it one of the widely used operating systems for hacking, it provides tools for hacking.

some common linux distributions are 

  • red hat linux
  • ubuntu
  • kali linux
  • backtrack etc.

kali linux is the most popular linux system specially customized  for these purpose of hacking.

2. LEARN PROGRAMING

 C is also referred to as the mother of all programming language forms the base

so hackers must master C programing as it allows utilize the open source operating system linux

try to learn more than one programming language to get the upper hand. an ethical hacker with sound knowledge of two to three programming language can dissect and analyze a piece of code. some of the best programming language  for hackers are:

PYTHON: extensively used for exploit writing

JAVASCRIPT: suitable for hacking web applications

PHP: helps fight against malicious attackers

SQL: best for hacking large database

3. LEARN STAYING ANONYMOUS

the most important step for hacker is to learn how to be anonymous and hide your identity online so that there is no track left and none can backtrack you.

often an ethical hacker might not know who else is in the same network, and if a black hat hacker figures out that there is someone else in the network, they might try to hack their system.

thus, anonymity is vital for ethical hackers as well using anonsurf, proxychains and macchanger are the three most promising ways to safeguard your identity.

4. LEARN NETWORKING

knowing networking concepts and how they are created is vital for ethical hackers, getting well-versed in various networks and protocols is beneficial in exploiting vulnerabilities.

an ethical hacker with in depth knowledge of networking tools such as NMAP, WIRESHARK, and others can survive this field.

most important networking concepts are:

  • TCP/IP NETWORK
  • SUBNETTING
  • NETWORK MASK AND CIDR 
  • SIMPLE NETWORK MANAGEMENT PROTOCAL
  • SERVER MESSAGE BLOCK
  • DOAMIN NAME SERVICE(DNS)
  • ADDRESS RESOLUTION PROTOCAL
  • WIRELESS NETWORKS
  • BLUETOOTH NETWORKS
  • SCADA NETWORKS(MODBUS)
  • AUTOMOBILE NETWORKS(CAN)
  • 5. TRAVERSE THE HIDDEN WEB

the part of the internet that remains hidden or is not visible to search engines is called the dark web.

it requires special authorization or software for access to the dark web.

it is the hotbed of criminal activity, but not everything is not illegal on dark web. it also has a legitimate side, and ethical hackers must learn about the dark web and how it works.

6. ADD SECRET WRITING TO YOUR SKILL SET

cryptography or secret writing is an important asset for an ethical hacker. the art of encrypting and decrypting is a must in hacking.

encryption finds usage in several aspects of information security such as authentication and more. valuable information is always encrypted on a network such as passwords.

a hacker must learn how to identify the encryption and breakit.

7. EXPERIMENT NAD PRACTICE

practicing and experimenting are the keys to success in the field of hacking.

ethical hackers need to practice the learnt concepts in various environments and scenarios, test various attacks, tools and more.

make a community or join forms for discussions with other hackers worldwide to exchange and share knowledge and work together

there are several communities on discord, facebook, telegram and many more platforms.

Post a Comment

Please do not enter any spam links in the comments box.

Previous Post Next Post