1 . Start from the ground up :
Learn how to create Web sites and conduct:
Of course your a hacker, you will meet many of the affected sites gaps which probably will tell the owner about their existence or are penetrating, and therefore it must be you highly knowledgeable and even be proficient most mastery of the conduct of the sites and the modalities and mechanisms of action, and to never let anything remains vague you know everything around this area and then moved to another area or rather a step further.
Here I recommend you search for multiple sessions in the creation and selection of sites hosting and how to use the Cpanels, and everything about it, I assure you Secondly, do not put anything remains vague, and do not forget as well as patience and not to rush ..
Of course your a hacker, you will meet many of the affected sites gaps which probably will tell the owner about their existence or are penetrating, and therefore it must be you highly knowledgeable and even be proficient most mastery of the conduct of the sites and the modalities and mechanisms of action, and to never let anything remains vague you know everything around this area and then moved to another area or rather a step further.
Here I recommend you search for multiple sessions in the creation and selection of sites hosting and how to use the Cpanels, and everything about it, I assure you Secondly, do not put anything remains vague, and do not forget as well as patience and not to rush ..
2 . learning programming language :
Of course, programming is the key that empowers you to discover gaps websites and applications, and therefore you have to give them the right to learn, and personally I advise you to begin with programming language C, because it is the origin of all programming languages (root, so to speak), and then go to other languages including: C++ and C#, and Python and the language Ruby, also do not forget the language of PHP!
And do not forget, even though it has become a hacker, not never stop learning, be a permanent development of yourself because you will be so informed on a permanent domain, and therefore will be a master of what you do in the sense of the word ..
Of course, programming is the key that empowers you to discover gaps websites and applications, and therefore you have to give them the right to learn, and personally I advise you to begin with programming language C, because it is the origin of all programming languages (root, so to speak), and then go to other languages including: C++ and C#, and Python and the language Ruby, also do not forget the language of PHP!
And do not forget, even though it has become a hacker, not never stop learning, be a permanent development of yourself because you will be so informed on a permanent domain, and therefore will be a master of what you do in the sense of the word ..
3 . learn manage systems :
Having learned some programming languages already mentioned, I have a shortcut on yourself now a lot of time, and now the remaining two phases require easy steps you patience as well, our time now learning systems management, and here I am talking to you about Linux and Unix as well, because the basic Linux from Unix, and therefore we should not neglect the latter.
When I say learn Linux, and I do not mean here to learn all the systems management, and this is of course difficult, famous and learning, and will need a lot in your business systems, as penetration testing distribution such as BackTrack (although the end of the update there is still not enough and still Used and a favorite of many), and learning Kali Linux, and Ubuntu (the easiest system is not fit for these things, it is very natural system such as Windows), as well as an unforgettable panel brackets and other similar distributions ..
There is an old saying : give Microsoft Windows, Linux gives you a whole house!
Give you any Microsoft Windows, Linux provides you with the whole house, and I understand the significance ..
When I say learn Linux, and I do not mean here to learn all the systems management, and this is of course difficult, famous and learning, and will need a lot in your business systems, as penetration testing distribution such as BackTrack (although the end of the update there is still not enough and still Used and a favorite of many), and learning Kali Linux, and Ubuntu (the easiest system is not fit for these things, it is very natural system such as Windows), as well as an unforgettable panel brackets and other similar distributions ..
There is an old saying : give Microsoft Windows, Linux gives you a whole house!
Give you any Microsoft Windows, Linux provides you with the whole house, and I understand the significance ..
Of course there is no hacker does not know how to run networks, and therefore you should follow up on this area courses, because he must know the protocols existing to serve such as TCP / protocol IP and HTTP and other .. I teach well, and will guarantee you that you may become people proficient in this area ..
5 . Reading books :
Reading books will help a lot for yourself that the development in this area dramatically, and know a lot and a lot of things, both in the conduct of operating systems, networks, in the methods used to penetrate and methods of protection and a lot of them ..
And therefore I advise you to create a small electronic library on your computer, collect the nearly 100 books or more, put a challenge that all of us implemented in this month ..
And therefore I advise you to create a small electronic library on your computer, collect the nearly 100 books or more, put a challenge that all of us implemented in this month ..
6 . learning Hacking methods :
Of course, when I say penetration methods is not limited to those
used in the penetration of computers, but more than that, I mean, here
even the so-called physical infiltration, that is, how to open the door
of the house without getting the keys, and those methods used by thieves
to steal houses and banks .. this also will help you to expand your
knowledge dramatically in this area, and that does not stay in that
shell that I've been before.
Do not forget to also learn other methods such as social engineering, and other than the programs do not need to, you use your mind here ..
Do not forget to also learn other methods such as social engineering, and other than the programs do not need to, you use your mind here ..
7 . Learn the decryption techniques :
Of course, when it penetrates the site, you will find the encrypted user data, and therefore you use special techniques to reveal these circumstances words and exhibited as real to her, and the easiest and most vulnerable is a function found in the PHP, which is the user data encryption, which is a function of the md5 where there are enough to unzip sites encryption encoded words quite easily and in a few seconds MD5 be the floor between your hands.
So you have to move to what is the most difficult and most complex in order to really know who you are !! I mean here Are you a professional or just a little kid hacker? ..
So you have to move to what is the most difficult and most complex in order to really know who you are !! I mean here Are you a professional or just a little kid hacker? ..
8 . Discuss With Hackers :
Try to engage in dialogue with them and to share experiences with them, they meet and in a certain place in order to discuss directly, of course it will be much better and would benefit a larger and have fun ..
9 . Do not forget studies certificates
Certificates guarantee you first jobs, because for example, that we take ceh certified ethical hacker and that is the ethical hacker certification, these circumstances latter will open a lot of doors for you when your search on jobs, where you can be included in the "CV" you're.
Another certificate Cisco, and MCITP of Microsoft, and others ..
In addition to these circumstances that such certificates obtained by Online you demonstrate to your efficiency in the field of penetration and protection ..
Certificates guarantee you first jobs, because for example, that we take ceh certified ethical hacker and that is the ethical hacker certification, these circumstances latter will open a lot of doors for you when your search on jobs, where you can be included in the "CV" you're.
Another certificate Cisco, and MCITP of Microsoft, and others ..
In addition to these circumstances that such certificates obtained by Online you demonstrate to your efficiency in the field of penetration and protection ..
10 . participated in competitions hacking that are held in your country :
Of course this will help to strengthen the spirit of challenge you have, and measure the strength and experience in this area ..
Good luck to all
|| Sy-Iq BlackHat Team ||
0 comments:
Post a Comment