13 steps to become a Professional Hacker

If you intend to be a professional hacker or simply curious to know what hackers are learning, then this article is for you.

First of all, you need to know that hacking in particular and information security is generally extremely difficult and hard work. They require patience as well as good knowledge. If you don't build a solid foundation from the beginning, you will never set foot on a true hacking path.

Introductory course on algorithms – programming continues to discount until October 21



# 1 Programming C

C is the most powerful programming language. Proficiency in C language is essential for programmers in general and hackers in particular.

C is a structured programming language. With the C language, tasks are broken down into smaller sections and these small parts are completed by some code. When learning C programming, the most important thing is that you have to use cursor proficiency as well as understand the memory allocation mechanism.

If you want to learn C the hacker way, refer to Zed.A Shaw's Learn C The Hardway.


# 2 Learn more programming languages

For Hacker, outside C, he still needs other powerful tools. One of those tools is high-level programming languages ​​like Java, Perl, and especially Python.

Learning more programming languages ​​other than C helps a lot in exploiting and patching application vulnerabilities.

Java is the world's most popular object-oriented programming language according to Tiobe 2016 rankings. It is known as a stable, robust, flexible language with very high security. Understanding security models applied in Java is the fastest way to help you understand the security platforms that apply in programming languages.

Perl is a versatile programming language, some of Perl's features are inspired by C. Python is famous for its short, easy-to-learn syntax. Although the syntax is simple, Python can do more things than you think: web programming, big data programming, writing automation tools, …


Join the largest Web programming community in Vietnam: Vietnamwebsummit.com

# 3 UNIX operating system

UNIX is a multitasking and multi-user operating system, designed to provide reliability and security for any system that uses it.

UNIX was developed by a team of researchers at AT&T Bell Lab.

The best way to learn about UNIX is to install and run it on your own computer. Then finding a classic book about it, Unix in a nutshell by Arnold Robbins is an example.

After learning how to use UNIX, you should learn more about UNIX architecture and core. With this array, we recommend reading the book "The Design of the UNIX OS" by Maurice J. Bach.

Currently, a very large number of web servers are running UNIX kernel operating systems. Therefore, the proficient use and understanding of UNIX design is an indispensable skill of programmers in general and hackers in particular.


# 4 Learn to add another operating system

In addition to the UNIX monument, Windows operating systems are also an interesting goal to learn.

There are 2 reasons for Windows classmates:

  1. Personal computers all use windows.
  2. This operating system has a lot of holes.

The practice of vulnerability exploitation has just brought you basic hacking skills, and taught you the importance and importance of updating Windows in particular and other software in general.


# 5 Computer network

To officially put a foot in the Hacker world, you need to be proficient in building, configuring, managing and exploiting computer networks.

Some basic knowledge you need to know includes: OSI and TCP / IP network models; Protocol sets used at different levels in the computer network: TCP, UDP, Telnet, HTTP, … Too many things to list in the framework of this article. So you need a book about computer networks. We suggest: Computer Networking: A Top-Down Approach By James F. Kurose and Keith W. Ross.

After mastering the basic computer network knowledge, go through the network scanning and monitoring tools. We recommend another book for you: Nmap Network Scanning : The Nmap Official Project Guide to Network Discovery and Security Scanning

# 6 Start with tutorials

Kali linux – a popular hacking tool with many tools included

To become a hacker, the shortest path is …. embark on a hack.

However, "touching" on large systems is not easy when there are many barriers both legal and professional to newbie. Therefore, the best route is to "practice hacking" according to the available scenarios.

Our advice: Let's start with Kali Linux – a classic operating system for many hackers, incorporating hundreds of tools to detect, exploit and attack security vulnerabilities.


# 7 Learning password

If you want to go one step further in your hacking career, you can't lack the knowledge of cryptography.

The need to hide information was formed thousands of years ago with the Caesar code. Now, when information is constantly being transmitted over long distances, encryption is the only secure method to protect information.

Information protection cryptographic methods ensure encryption and decryption of confidential data (confidentiality) and are also used to confirm the authenticity (authenticity) of the data source and control the integrity of data.

Understanding the advantages and disadvantages of modern cryptographic tools such as symmetric, asymmetric, hash function, digital signature … is the minimum requirement for both black hat and white hat hackers.


# 8 Experiment

Experts of West Fur have very detailed statistics. To become an expert in any field, you need to earn at least 10,000 hours of work in that field.

Hacking is no exception.

Continuous and regular practice is a prerequisite to help you reach a higher level of a hacker.

To start practicing what you have learned, perhaps the first thing you need is a "personal lab" with all the necessary equipment. At the simplest level, you need to prepare: personal computer – at least 2 – relatively configurable, enough to run parallel multiple virtual machines on it; Internet connection; Network devices: Router, Switch (if any) ….

After having prepared enough equipment and started working, you should also note the following 5 things:

  1. Always back up the system before testing anything new.
  2. Begin gently, trying to accomplish the small goals first.
  3. Record the hacking process carefully
  4. Do not limit yourself but know where to stop
  5. Automate repetitive tasks.


# 9 Reading expert books

No matter what hackers, reading skills are one of the necessary skills for everyone

When you become a hacker, you always have to gather information as well as update your knowledge and skills with frequency of 4-5 times more than normal people. At that time, good reading skills (specifically reading speed and information condensing ability) will give you a lot of advantages in scanning and capturing information.

Initially, you can practice some reading techniques like Skimming or chunk reading …


# 10 Participate in competitions

Learning with practice. And participating in hacking contests is the fastest way to reach and improve your ability to handle real-life situations. There are quite a few companies that host hacking competitions, both for the purpose of checking holes in a certain product, while aiming to attract and detect talent. At events of this type, there are many different forms of competition such as attacking – defending, robbing flags, learning codes, …

You can refer to the list of 13 websites that regularly host hacking contests here


# 11 Level up by detecting vulnerabilities yourself

Vulnerability is a weakness in the system, which can be used to harm systems and users.

Scanning and vulnerability detection are also a classic approach if you want to go deeper into the security world. Some vulnerabilities are so famous that you can practice exploiting them now: MS 08-067 vulnerability (leading to unauthorized remote control of the computer), Apache web server vulnerability (lower version 2.0), ….

However, digging into old holes is not the work of a real security specialist (and a true hacker). While black-hat hackers attempted to detect and exploit zero-day vulnerabilities (unpublished vulnerabilities), on the other side of the front line, the white-hat faction was also actively scanning and holes like this.

What I want to say here is try to get used to discovering and patching new vulnerabilities, because this work can become your main source of income.

The "dirtiest" vulnerability of facebook is also rewarded with 500 USD

# 12 Contribute to the Open Source Security Project

Make sure you have used at least 1 product on this list

Contributing to open source projects will take you one step further in your career. Not everyone is mentally qualified and able to do this. By contributing your resources to open source products, you have contributed a brick to building an ever-expanding Open Source community. And of course with a strong community, it is possible to change the world.

# 13 Study, study, study forever

Rome cannot be built in a day.

The key to success is the STOP learning process .

ITZone via Techmaster

Share the news now