Documente Academic
Documente Profesional
Documente Cultură
as -
Get into a programmer�s role for a few years and then switch to get a tech support
position.
Proceed to get network certifications like Network+ or CCNA and then security
certifications like Security+, CISSP, or TICSA.
It is recommended that you get some work experience as a Network Engineer and
System Administrator to understand networks and systems inside out.
Keep going through various books, tutorials and papers to understand various
computer security aspects and take them as a challenge to secure your network and
computer systems as network security engineer.
Study courses which cover creating Trojan horses, backdoors, viruses, and worms,
denial of service (DoS) attacks, SQL injection, buffer overflow, session hijacking,
and system hacking.
Master the art of penetration testing, footprinting and reconnaissance, and social
engineering.
Hacking wifi:
First you have to determine what kind of password encryption is used for the wifi.
WEP or WPA2 or WPS. You will need kali linux and 2 network adapters. Make sure the
adapters are suitable with Aircrack-ng. Aircrack-ng is the tool used to crack wifi
pass.word along with some other tools. Download wifiphisher to your kali os, And
there is a need for some other combination of tools.
Hacking bank:
I dont know why some people wants to know this. If you want to take it as a
knowledge , its okay. If you gonna do something, let me know. I can visit you in
the prison. Well , different bank have different network infrastructure. They have
their own tools and techniques in defending themselves. So footprinting is the
first process. Footprinting is a process where you will gather information on the
system and infrastructure. Different hackers have different techniques in breaching
bank system. Well if I was born an asshole with the same hacking knowledge now, I
would write a malware program and keylogger and connect my pc with their wifi and
get access to one of the pc in the bank and send the malware through remote
backdoor. (Remote Application in your pc now will ask permission to connect, but
there are other remote tools to connect without their own knowledge)Once my malware
and keylogger is successfuly install on their pc , its much easier to work after
that. keylogger can be use to track the computer , the webcam, the keyboard, even
the screen,and all the username,email n password typed in the computer will be send
to me by the keylogger. Malware will do its job depends on how i programmed it.
Maybe i program a malware to infect other devices on the network or the malware can
steal and etc. So basicly this is how breaching the bank system works. But i was
born a good guy , so i always wanted to make use of my knowledge for the betterment
of the future.
Coding knowledge:
Web: HTML,Javascript,PHP,Sql
Exploit writing: Python,ruby
Reverse engineering: c++,c,java
Computing knowledge:
Knowledge about the operating system and networking is good enough.
Well. I have wrote about the basics of hacking. The very basics. I have even
mentioned the tools used. So if you have the willingness to learn, take up courses.
Learn the tools. They take time to master.
What are the processes of ethical hacking?
Like all good projects, ethical hacking too has a set of distinct phases. It helps
hackers to make a structured ethical hacking attack.
Reconnaissance
Reconnaissance is the phase where the attacker gathers information about a target
using active or passive means. The tools that are widely used in this process are
NMAP, Hping, Maltego, and Google Dorks.
Scanning
In this process, the attacker begins to actively probe a target machine or network
for vulnerabilities that can be exploited. The tools used in this process are
Nessus, Nexpose, and NMAP.
Gaining Access
In this process, the vulnerability is located and you attempt to exploit it in
order to enter into the system. The primary tool that is used in this process is
Metasploit.
Maintaining Access
It is the process where the hacker has already gained access into a system. After
gaining access, the hacker installs some backdoors in order to enter into the
system when he needs access in this owned system in future. Metasploit is the
preferred tool in this process.
Clearing Tracks
This process is actually an unethical activity. It has to do with the deletion of
logs of all the activities that take place during the hacking process.
Reporting
Reporting is the last step of finishing the ethical hacking process. Here the
Ethical Hacker compiles a report with his findings and the job that was done such
as the tools used, the success rate, vulnerabilities found, and the exploit
processes.
Quick Tip
The processes are not standard. You can adopt a set of different processes and
tools according to your techniques that you are comfortable with. The process is of
least significance as long as you are able to get the desired results.
Active Reconnaissance
In this process, you will directly interact with the computer system to gain
information. This information can be relevant and accurate. But there is a risk of
getting detected if you are planning active reconnaissance without permission. If
you are detected, then system admin can take severe action against you and trail
your subsequent activities.
Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This
process is used to gather essential information without ever interacting with the
target systems.
Ghost in the Wires: My Adventures as the World�s Most Wanted Hacker by Kevin D.
Mitnick
The Art of Deception: Controlling the Human Element of Security by Kevin D.
Mitnick
Social Engineering: The Art of Human Hacking by Christopher Hadnagy
The Manipulation of Human Behavior
The 48 Laws of Power by Robert Greene
The Power Broker: Robert Moses and the Fall of New York by Robert A. Caro
How to Win Friends and Influence People by Dale Carnegie
Arrest Proof Yourself by Dale Carson
Influence: The Psychology of Persuasion by Robert B. Cialdini
The Spycraft Manual: The Insider�s Guide to Espionage by Barry Davies
Emotions Revealed: Recognizing Faces and Feels to Improve Communication and
Emotional Life by Paul Ekman
The Art of the Steal: How to Protect Yourself and Your Business from Fraud,
America�s #1 Crime by Frank W. Abagnale
Unauthorized Access: Physical Penetration Testing for IT Security Teams by Wil
Allsopp
Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage by
Paul Ekman
Unmasking the Social Engineer: The Human Element of Security by Christopher
Hadnagy
Phishing Dark Waters: The Offensive and Defensive Side of Malicious Emails by
Christopher Hadnagy
Covert Persuasion: Psychological Tricks and Tactics to Win the Game by Kevin
Hogan
The Psychology of Persuasion: How to Persuade Others to Your Way of Thinking by
Kevin Hogan
The Power of Mindful Learning by Ellen J. Langer
Counterclockwise Mindful Health and the Power of Possibility by Ellen J. Langer
Get Anyone to do Anything: Never Feel Powerless Again by David J. Lieberman
The Big Con: The Story of the Confidence Man by David Maurer
Bargaining with the Devil: When to Negotiate, When to Fight by Robert Mnookin
Spycomm: Covert Communication Techniques of the Underground by Lawrence W.
Myers
What Every BODY is Saying: An Ex-FBI Agent�s Guide to Speed Reading People by
Joe Navarro
It�s Not All About �Me�: The Top Ten Techniques for Building Rapport with
Anyone by Robin Dreeke
Influence: Science and Practice by Robert B. Cialdini