20 Steps to be a Great Hacker | HackTHatCORE

20 Steps to be a Great Hacker | HackTHatCORE

20 Steps to be a Great Hacker | HackThatCORE

Hacker

A hacker is a creative programmer, a creative cryptographer, a human with a good knowledge of networking, operating systems and many more and the best and creative social engineer who easily controls any mind.
Here are my 20 steps, by following which at extreme dedication level, anyone can become a great hacker.
***This post is for educational purpose only.

    1. Learn TCP/IP, Basic Information Gathering, Proxies, CC Sockets, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.
    2. Learn Linux, Unix, Windows - You can do this using VMware, Virtual Box or any virtual desktop Utility (One of them is Hyper-V in Windows Operating system).
    3. Learn a programming language with a strong edge of perfection that is compatible with all OS - Perl, Python, C, ASM
    4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI and all their basics should be very clear to you.
    5. Learn Reverse engineering and crack some programs for their serial numbers. Try easy ones like mirc, winzip, winrar or old games.
    6. Code a fuzzer for common protocols - FTP, POP3, 80, 8080. Pick some free softwares like FTP Server, Mail Server, Apache or IIS Webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.
    7. Code a tool that uses grep to sort out unique code in source codes.
    8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and outgoing traffic and add filters to accept certain ports that your software or script use.
    9. Pick a kernel in Linux or Unix, also pick a Microsoft OS version like Windows XP Pro Service Pack 2. Put them on the Virtual Workstations like VMware and find and also code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix adn a IIS Webserver on the Windows OS and Attempt to find and code a new local reverse_tcp_shell exploit.
    10. Learn Cisco Router and Switch configuration and setup.
    11. Learn Checkpoint Setup and Config
    12. Learn Wifi scanning, cracking, sniffing.
    13. Pick a person in your phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, date of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get . The Attempt to ring using a spoof caller ID software with person's phoe number. Call the ISP and try to reset the password to his/her internet connection/web-mail, get access to bank account or ask them to send out a new password to a new address (drop) with a new pin, reset of phone company passwords.
    14. Use your information gathering skills to get all the information off a website like a shop then use the spoof caller-id software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try to get the shop site password.
    15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.
    16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone elses exploit.
    17. Make your own linux Distro.
    18. Use your own Linux Distro or use a vanilla Linux gnome (not kde). Keep it witnnot much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploit scanners..etc. Then Load them up with your own scripts and other tools (By this stage you shouldn't need to depend on other peoples scripts).
    19. Learn MacOSX and attempt to gain access to a MacOSX whether it be your own or someone's else.
    20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.

Comments

Popular Posts