Sunteți pe pagina 1din 5

As an ethical hacker, you will need to understand various hacking techniques such

as -

Password guessing and cracking


Session hijacking
Session spoofing
Network traffic sniffing
Denial of Service attacks
Exploiting buffer overflow vulnerabilities
SQL injection
An ethical hacker must be a computer systems expert and needs to have very strong
programming and computer networking skills.

An ethical hacker needs to have a lot of patience, persistence, and perseverance to


try again and again and wait for the required result.

Additionally, an ethical hacker should be smart enough to understand the situation


and other users� mind-set in order to apply social engineering exploits. A good
ethical hacker has great problem-solving skills too.
. If you want to excel in this field, then you might choose to pursue the following
courses and certifications -

Obtain a bachelor�s degree in Computer Science or A+ Certificate to gain an


understanding of the most common hardware and software technologies.

Get into a programmer�s role for a few years and then switch to get a tech support
position.

Proceed to get network certifications like Network+ or CCNA and then security
certifications like Security+, CISSP, or TICSA.

It is recommended that you get some work experience as a Network Engineer and
System Administrator to understand networks and systems inside out.

Keep going through various books, tutorials and papers to understand various
computer security aspects and take them as a challenge to secure your network and
computer systems as network security engineer.

Study courses which cover creating Trojan horses, backdoors, viruses, and worms,
denial of service (DoS) attacks, SQL injection, buffer overflow, session hijacking,
and system hacking.

Master the art of penetration testing, footprinting and reconnaissance, and social
engineering.

Finally go for a Certified Ethical Hacker (CEH) Certification.

GIAC (Global Information Assurance Certification) and Offensive Security Certified


Professional (OSCP) are additional IT security certifications which will add a lot
of value to your profile.

Most of the questions asked in this group are as following:


-How to hack Facebook account
-How to hack wifi
-How to hack bank
-How to hack google account
-What OS to be used for hacking
And many others....
Alright , let me answer the questions for alllll of your doubts. If you want to
crack into someone's gmail,facebook or account , you can use several techniques.
Phishing is commonly used. Phishing is a method where you close facebook homepage
and redirect it to your own link. So you have to send an email or sms or whatever
to the victim and persuade him to login via the cloned webpage made by you. And you
also have to make sure you coded the webpage so that the password wont be encrypted
,and will be saved in your SQL database or watever. And then you can use dictionary
attacks. Dictionary attacks are password guessing, you do some commands and link
some .txt files full of wordlist and it will login the email with each word in
the .txt file and it will show you once a word is identified as password.

Hacking wifi:
First you have to determine what kind of password encryption is used for the wifi.
WEP or WPA2 or WPS. You will need kali linux and 2 network adapters. Make sure the
adapters are suitable with Aircrack-ng. Aircrack-ng is the tool used to crack wifi
pass.word along with some other tools. Download wifiphisher to your kali os, And
there is a need for some other combination of tools.

Hacking bank:
I dont know why some people wants to know this. If you want to take it as a
knowledge , its okay. If you gonna do something, let me know. I can visit you in
the prison. Well , different bank have different network infrastructure. They have
their own tools and techniques in defending themselves. So footprinting is the
first process. Footprinting is a process where you will gather information on the
system and infrastructure. Different hackers have different techniques in breaching
bank system. Well if I was born an asshole with the same hacking knowledge now, I
would write a malware program and keylogger and connect my pc with their wifi and
get access to one of the pc in the bank and send the malware through remote
backdoor. (Remote Application in your pc now will ask permission to connect, but
there are other remote tools to connect without their own knowledge)Once my malware
and keylogger is successfuly install on their pc , its much easier to work after
that. keylogger can be use to track the computer , the webcam, the keyboard, even
the screen,and all the username,email n password typed in the computer will be send
to me by the keylogger. Malware will do its job depends on how i programmed it.
Maybe i program a malware to infect other devices on the network or the malware can
steal and etc. So basicly this is how breaching the bank system works. But i was
born a good guy , so i always wanted to make use of my knowledge for the betterment
of the future.

How to prepare yourselves to be a hacker:

Operating System needed:


-Kali Linux (most hacking activity happens here)
-Whonix (you can be completely anonymous here)
-Windows 7 (I dont recomend windows 10, windows 7 r much broader)

Coding knowledge:

Web: HTML,Javascript,PHP,Sql
Exploit writing: Python,ruby
Reverse engineering: c++,c,java

Computing knowledge:
Knowledge about the operating system and networking is good enough.

Well. I have wrote about the basics of hacking. The very basics. I have even
mentioned the tools used. So if you have the willingness to learn, take up courses.
Learn the tools. They take time to master.
What are the processes of ethical hacking?

Like all good projects, ethical hacking too has a set of distinct phases. It helps
hackers to make a structured ethical hacking attack.

Different security training manuals explain the process of ethical hacking in


different ways, but for me as a Certified Ethical Hacker, the entire process can be
categorized into the following six phases.

Ethical Hacking Process

Reconnaissance
Reconnaissance is the phase where the attacker gathers information about a target
using active or passive means. The tools that are widely used in this process are
NMAP, Hping, Maltego, and Google Dorks.

Scanning
In this process, the attacker begins to actively probe a target machine or network
for vulnerabilities that can be exploited. The tools used in this process are
Nessus, Nexpose, and NMAP.

Gaining Access
In this process, the vulnerability is located and you attempt to exploit it in
order to enter into the system. The primary tool that is used in this process is
Metasploit.

Maintaining Access
It is the process where the hacker has already gained access into a system. After
gaining access, the hacker installs some backdoors in order to enter into the
system when he needs access in this owned system in future. Metasploit is the
preferred tool in this process.

Clearing Tracks
This process is actually an unethical activity. It has to do with the deletion of
logs of all the activities that take place during the hacking process.

Reporting
Reporting is the last step of finishing the ethical hacking process. Here the
Ethical Hacker compiles a report with his findings and the job that was done such
as the tools used, the success rate, vulnerabilities found, and the exploit
processes.

Quick Tip
The processes are not standard. You can adopt a set of different processes and
tools according to your techniques that you are comfortable with. The process is of
least significance as long as you are able to get the desired results.

WHAT IS Reconnaissance OR FOOTPRINTING

During reconnaissance, an ethical hacker attempts to gather as much information


about a target system as possible, following the seven steps listed below -

Gather initial information


Determine the network range
Identify active machines
Discover open ports and access points
Fingerprint the operating system
Uncover services on ports
Map the network

Reconnaissance takes place in two parts - Active Reconnaissanceand Passive


Reconnaissance.

Active Reconnaissance
In this process, you will directly interact with the computer system to gain
information. This information can be relevant and accurate. But there is a risk of
getting detected if you are planning active reconnaissance without permission. If
you are detected, then system admin can take severe action against you and trail
your subsequent activities.

Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This
process is used to gather essential information without ever interacting with the
target systems.

Ghost in the Wires: My Adventures as the World�s Most Wanted Hacker by Kevin D.
Mitnick
The Art of Deception: Controlling the Human Element of Security by Kevin D.
Mitnick
Social Engineering: The Art of Human Hacking by Christopher Hadnagy
The Manipulation of Human Behavior
The 48 Laws of Power by Robert Greene
The Power Broker: Robert Moses and the Fall of New York by Robert A. Caro
How to Win Friends and Influence People by Dale Carnegie
Arrest Proof Yourself by Dale Carson
Influence: The Psychology of Persuasion by Robert B. Cialdini
The Spycraft Manual: The Insider�s Guide to Espionage by Barry Davies
Emotions Revealed: Recognizing Faces and Feels to Improve Communication and
Emotional Life by Paul Ekman
The Art of the Steal: How to Protect Yourself and Your Business from Fraud,
America�s #1 Crime by Frank W. Abagnale
Unauthorized Access: Physical Penetration Testing for IT Security Teams by Wil
Allsopp
Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage by
Paul Ekman
Unmasking the Social Engineer: The Human Element of Security by Christopher
Hadnagy
Phishing Dark Waters: The Offensive and Defensive Side of Malicious Emails by
Christopher Hadnagy
Covert Persuasion: Psychological Tricks and Tactics to Win the Game by Kevin
Hogan
The Psychology of Persuasion: How to Persuade Others to Your Way of Thinking by
Kevin Hogan
The Power of Mindful Learning by Ellen J. Langer
Counterclockwise Mindful Health and the Power of Possibility by Ellen J. Langer
Get Anyone to do Anything: Never Feel Powerless Again by David J. Lieberman
The Big Con: The Story of the Confidence Man by David Maurer
Bargaining with the Devil: When to Negotiate, When to Fight by Robert Mnookin
Spycomm: Covert Communication Techniques of the Underground by Lawrence W.
Myers
What Every BODY is Saying: An Ex-FBI Agent�s Guide to Speed Reading People by
Joe Navarro
It�s Not All About �Me�: The Top Ten Techniques for Building Rapport with
Anyone by Robin Dreeke
Influence: Science and Practice by Robert B. Cialdini

S-ar putea să vă placă și