So, You Want to Become a Hacker?

July 27, 2016 | Views: 14308

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

You see a lot of articles that explain, to become a Hacker, you need to know a lot of programming languages, which is something something not everybody can do. This approach has some truth, but at the same time, is closed minded.

Hacking, in simplest terms, is making an asset behave in a way it was not originally designed to do. Therefore, hacking doesn’t apply only to computers, but assets that can anything from a simple POT (Plain Old Telephone) to a human.

Everyone is focused on hacking into a router, someone’s computer or a Facebook account. But, in this day and age, brute forcing doesn’t work as well and may call for other methods, which might specialties. There are certain people out there that claim you cannot call yourself a hacker unless you can write your own programs and use them to gain access to someone’s computer…that’s rubbish!!

Various hackers from different backgrounds have many skills and some may specialize in certain areas, like particular devices that may only be found in nuclear power plants or creating an RFID cloner to gain access to (EAC) Electronic Access Control systems.

The birth of modern day hacking can be traced back to John Draper (aka Captain Crunch), who created a blue box that allowed individuals to make free telephone calls through a particular frequency. When he started, his skills were solely radio transmitters to build his own radio.

Many hacks are conducted using Social Engineering or physical access to the network or from badly scripted websites/applications, rather than those from across the internet. Even if you have access to a network, that doesn’t mean you’re going to see what’s there.

For example, you may have gained access to an unlocked server room and you plug in your laptop to an Ethernet port and run NMAP to see what’s there, but nothing is returned. This could be due to MAC filtering or closed ports etc.

 

So let’s start with the first question that occurs all the time: “How do I become a hacker?”

I’ll try to explain, in my own opinion and from my own experience, how to become a hacker. You’ll  indefinitely require patience, curiosity and willingness to learn. I have chosen these three characteristics because hacking is a waiting game and might not get results straight away. You need to be curious to find out how things work, how they connect and interact with each other in order to understand potential vulnerabilities. The willingness to learn is the biggest one, regardless of your skill level, as hacking is a fast paced game and even professionals still learn daily. They need to stay on top of new techniques and defend against vulnerabilities.

 

Next, some basic skills:

  • Understand how a computer works – in terms of binary, what a MAC or NIC is and how to maneuver around your computer (Command Line/Terminal) without using the GUI.
  • Understand networking intimately – at least CCNA/Networking+ level  – minimum.
  • Learn a programming language – Start with Python, as it’s a powerful tool and uses simple syntax (2.x or 3.x). Don’t just learn the syntax, but understand how the code compiles and understand the exceptions and why they get thrown. Also, understand how to code defensively to maximize your security. Additionally, be sure to understand how to manipulate/extract data from your own computer using your programs.

These are the basic skills that are foundational. Once you’re confident in your knowledge, move on to understand web languages like HTML, CSS, JavaScript, PHP and SQL. These don’t have to be learned sequentially, but don’t bite more than you can chew. Understand what you’re learning and practice all the time. Try out different things, not just what the tutorial is telling you…explore!

On your journey to becoming a hacker, always have your mind open to new ideas and learn new technology as well as old ones. The first part of any hacking situation is gathering intelligence, which may require you to physically access a building via lock picking, scaling walls/fences or social engineering your way in. These buildings may have motion sensors or infrared cameras and you may need to understand how these devices work and their arcs of view in order to mitigate your presence.

If your following tutorials and they’re not working for you, find out why they’re not working. Are you using the right parameters within the tool or has the network got a Network Intrusion Prevention System in place that’s stopping you? If so, you need to understand how these work in order to prod your way through or around it. On the other end of the spectrum, if things are working fine and it was super easy to get in…be careful as this could be a honey pot.

The above information is based on my own experiences. White/Grey/Black Hat Hackers are all the same, except their intentions.


References that may enhance your learning:

Understand How a Computer Works

Linux

Understand Networks

CCNA

Python 2.x

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
41 Comments
  1. I am confused by the sentence found in your third paragraph: “But, in this day and age, brute forcing doesn’t work as well and may call for other methods, which might specialties.” Can you clarify? Thanks.

    • The sentence means that the encryptions used and security policies in place makes brute forcing almost impossible and other methods like keyloggers, rootkits or social engineering is better used and can be alot quicker.

  2. A friend just went back to school and graduated and asked me about getting into InfoSec. He asked which Cert would do it. After I stopped laughing, I gave him a old Juniper Netscreen and put some stuff for CEH, CISSP, ScreenOS, CCNA, and Linux into a Dropbox to get him started.

    He initially thought CISSP would do the trick. He then called and asked……what for it folks…..”That’s a lot to read!” I really died. I wanted to tell him InfoSec is NOT FOR YOU!

    You have to have a burning in your belly to want to learn everything about IT and realize you will always be working, reading, labbing, and failing exams until you pass them to just restudy the stuff in 2-3 years to take the now harder “English” test of what are they asking, what does that answer mean, and which is the “BEST! Friggin’ Answer!!!!!! Certs get old!

    Then recruiters will ask you if your CCNA that you have had and renewed 3 times since 2002, every time to work for a VAR because that is the only time a valid Cert matters.

    But seriously with all the Certs I have and all I want to learn I realize the more I learn the less I know is all I have learned about InfoSec, but I love it! I must don’t do it for the “Chix” (We can’t attract any into the Industry hardly), the money, to be a contractor, and the time between projects studying for the new laundry list item from some recruiter that would do better by their client to grab a book and go try and pass just 1 Cert exam! 🙂
    (No offense ladies with the “chix” comment, it jocularity license.” I spent more time and make more money being a comedian. 🙂

    • Nice! Fully agree, there are more women joining the IT crowd than previous years, but in the InfoSec realm as engineers, there seems to be a big gap (a lot in Management). Recruiters personally don’t seem to get, what the clients are requesting and what they are looking for…really frustrates me!!!

  3. thanks for this help

  4. Could not agree less. Nice article.

Page 4 of 5«12345»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel