SlideShare a Scribd company logo
1 of 20
Complete guide to
become an Ethical Hacker
http://programmingethicalhackerway.blogspot.in/
Who is ethical hacker?
- A hacker is someone who exploit the
vulnerability in system.
- A ethical hacker is someone who exploit the
vulnerability in system with permission of
owner.
- The ethical hackers may also known as grey
hat or white hat hackers .
http://programmingethicalhackerway.blogspot.in/
may I become a hacker ?
- YES.. Everyone can become a hacker.
- Always think like a hacker.
- A hacker thinks how it works, what if it is not
so, what if i do so, It works in my control
- A hacker is curious to learn, keep
patience,deeply aspiring to learn.
- In simple words, with zero technical
knowledge everyone can become a hacker.
http://programmingethicalhackerway.blogspot.in/
What needs to learn to hacker?
- Learn about computer system
- hacker should have good knowledge about
operating systems(Unix and Windows)
- Learn Programming
- computer hacker : C/C++,Python,Assembly
- web hacker : HTML, Javascript, PHP, SQL
- Learn Networking.
- Join Hacker Forums.
http://programmingethicalhackerway.blogspot.in/
Resources to learn
- Programming
- C programming in hacker way
- Assembly programming in hacker way
- Python programming in hacker way
- Networking for hackers
- Join hackers forums on social websites like Facebook, Twitter.
- Some facebook groups recommend :
- Programming : Hacker's Way
- H4cK!nG: F0r B3g!nn3r
- Security Researchers
- join ethical hacking communities like HackThisSite, Black-Hat Forums etc.
http://programmingethicalhackerway.blogspot.in/
Hacker Profession
- As a doctor have a special profession like Dentist,
Allergist, Surgeon... the hacker have also a special
profession.
- The hackers profession are exploit writer, vulnerability
researcher, security researcher, shellcode writer,
reverse engineer, virus and malware writer, penetration
tester, network hacker, web-application hacker,
computer hacker and many more….
- a simple mean of hacker is penetration tester who
enters the system.
http://programmingethicalhackerway.blogspot.in/
Which hacker profession should elect ?
- i would recommend “Choose
According to Your Passion”.
http://programmingethicalhackerway.blogspot.in/
Hackers profession in detail
- A computer hacker is someone who hack machine or
computer
- A exploit writer is someone who exploit the vulnerability
of a program
- A shellcoder is someone who writes shellcodes that can
be injected in an application and returns a remote (or
local) shell when executed
- A security researcher is someone who finds the security
hole in the system and makes it secure.
http://programmingethicalhackerway.blogspot.in/
…..Continue
- A reverse engineer is someone who breaks the
compiled code for ethical or unethical purpose.
- A virus and malware writer is someone who writes the
malicious code with malicious intentions.
- A web-application hacker is someone who hack
websites or find web-application vulnerabilities.
- A network hacker is someone who hack network like
sniffing, pack-crafting, breaking IDS rules or firewall,
packet capturing and more…
- I think now you must have an idea about your passion.
http://programmingethicalhackerway.blogspot.in/
Professional Ethical Hacking course
- CEH(certified ethical hacker):The Certified Ethical
Hacker is a professional certification, provided by the
EC-Council.
- SANS Security : SANS is by far the largest source for
information security training and security certification in
the world.
- Offensive security: Offensive security offer many types
of information security certification courses like
OSCP(offensive security certified professional),OSEE...
http://programmingethicalhackerway.blogspot.in/
Resources : Books
- Google might not help for Proper resources
of learning hacking.
- Here i will share my experience
- So let’s start…….
http://programmingethicalhackerway.blogspot.in/
Books: for learning hacking
- Hacking: The Art of Exploitation : very good book on the subject of
hacking.
- The Hacker's Underground Handbook :If you are coming from a position
of absolutely no knowledge of the hacking, this may be useful to you.
- Gray Hat Hacking -The Ethical Hackers Handbook
- Violent python -A Cookbook for Hackers :great for those who are new
to the python language and would like example use cases of simplistic
security tools
- Black Hat Python-Python Programming for Hackers and Pentesters
:explores the darker side of Python's capabilities writing network sniffers,
manipulating packets, infecting virtual machines, creating stealthy Trojans.
http://programmingethicalhackerway.blogspot.in/
Books: for Reverse Engineer
- Reversing - Secrets of Reverse Engineering: walked you through the
techniques which can be used in reverse/anti-reverse software.
- The.IDA.Pro.Book.2nd.Edition : this is a book on how to use IDA, not a
book on how to read dis-assembly.
- Gray Hat Python- Python Programming for Hackers and Reverse
Engineers
- Hacker Disassembling Uncovered-Powerful Techniques To Safeguard
Your Programming : a good primer to the art of reverse engineering and
deals with how to go about disassembling a program with holes without its
source code
- Programming from the ground up : takes you a step at a time through
assembly language concepts
http://programmingethicalhackerway.blogspot.in/
Books: for Shellcoding and exploit
- A Bug Hunter's Diary : gives valuable insights on different techniques of
bug hunting and exploiting them successfully
- Sockets, Shellcode, Porting & Coding : divided into 5 main categories
with each category representing a major skill set required by most security
professionals.
- The.Shellcoders.Handbook.2nd.Edition : This is a very good book on
software vulnerabilities.
- Exploiting Software- How to Break Code : describes basic attacks on
application software.
- Buffer Overflow Attacks - Detect, Exploit, Prevent : This book clearly
explains the basics of stack overflow, off by one, heap overflow and string
format attacks.
http://programmingethicalhackerway.blogspot.in/
Books: for Web-Hacking
- The.Web.Application.Hackers.Handbook :This is by far the best book
I've ever read on web application security. If you do any type of
professional Web Application Assessments then this is your bible.
- Botnets The Killer Web Applications Hacking :This is the first book to
explain the newest internet threat Botnets, zombie armies, bot herders.
- OWASP :The Open Web Application Security Project is an online
community dedicated to web application security.
http://programmingethicalhackerway.blogspot.in/
Important Toolkit for Hackers
- Kali-linux : Kali Linux is an advanced Penetration Testing and Security
Auditing Linux distribution.It has more than 300 penetration testing tools.
- Metasploit : most advanced and popular Framework that can be used to
for pen-testing.
- Namp : very popular tool that predominantly aids in understanding the
characteristics of any target network.
- Wireshark : Wireshark is a network packet analyzer.A network packet
analyzer will try to capture network packets and tries to display that packet
data as detailed as possible
- Nessus : Nessus is a great tool designed to automate the testing and
discovery of known security problems.
http://programmingethicalhackerway.blogspot.in/
…..Continue
- Cain & Abel :Cain and abel is one of best Tool that is commonly used to
Poison the network If cracking encrypted passwords or network keys is
what you need, then Cain & Abel is the tool for you.
- John The Ripper : This is the most powerful password cracker tool.
- Acunetix : Acunetix is essentially a web vulnerability scanner targeted at
web applications. It provides SQL injection, cross site scripting testing, PCI
compliance reports etc.
- Burp Suite : This tool is used to performing a Web Application Penetration
Test.
- Havij pro : Havij is an automated SQL Injection tool that helps penetration
testers to find and exploit SQL Injection vulnerabilities on a web page.
http://programmingethicalhackerway.blogspot.in/
Final words….
- Here I share my whole experience with you.Hope this
guide will help you.
- In your hacking journey, you will face many challenges.
Always one thing keep in mind ”Don’t give up”
- Sometime frustration stage comes where you need
“Be patient”
- Always “Face challenges smartly”
- You Won’t become an hacker overnight; it takes years
of practice and real world experience to become
professional hacker.
http://programmingethicalhackerway.blogspot.in/
Contact ME:
- Follow Me on Google+ : SANDEEP SAINI
- Visit My Blog : Programming:Ethical
Hacker Way
- Like blog on facebook :Programming:Ethical
Hacker Way
http://programmingethicalhackerway.blogspot.in/
The end
Let’s start your hacker journey and
enjoy it……..
Best Wishes
http://programmingethicalhackerway.blogspot.in/

More Related Content

Recently uploaded

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Recently uploaded (20)

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Featured

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Complete guide to become an ethical hacker !

  • 1. Complete guide to become an Ethical Hacker http://programmingethicalhackerway.blogspot.in/
  • 2. Who is ethical hacker? - A hacker is someone who exploit the vulnerability in system. - A ethical hacker is someone who exploit the vulnerability in system with permission of owner. - The ethical hackers may also known as grey hat or white hat hackers . http://programmingethicalhackerway.blogspot.in/
  • 3. may I become a hacker ? - YES.. Everyone can become a hacker. - Always think like a hacker. - A hacker thinks how it works, what if it is not so, what if i do so, It works in my control - A hacker is curious to learn, keep patience,deeply aspiring to learn. - In simple words, with zero technical knowledge everyone can become a hacker. http://programmingethicalhackerway.blogspot.in/
  • 4. What needs to learn to hacker? - Learn about computer system - hacker should have good knowledge about operating systems(Unix and Windows) - Learn Programming - computer hacker : C/C++,Python,Assembly - web hacker : HTML, Javascript, PHP, SQL - Learn Networking. - Join Hacker Forums. http://programmingethicalhackerway.blogspot.in/
  • 5. Resources to learn - Programming - C programming in hacker way - Assembly programming in hacker way - Python programming in hacker way - Networking for hackers - Join hackers forums on social websites like Facebook, Twitter. - Some facebook groups recommend : - Programming : Hacker's Way - H4cK!nG: F0r B3g!nn3r - Security Researchers - join ethical hacking communities like HackThisSite, Black-Hat Forums etc. http://programmingethicalhackerway.blogspot.in/
  • 6. Hacker Profession - As a doctor have a special profession like Dentist, Allergist, Surgeon... the hacker have also a special profession. - The hackers profession are exploit writer, vulnerability researcher, security researcher, shellcode writer, reverse engineer, virus and malware writer, penetration tester, network hacker, web-application hacker, computer hacker and many more…. - a simple mean of hacker is penetration tester who enters the system. http://programmingethicalhackerway.blogspot.in/
  • 7. Which hacker profession should elect ? - i would recommend “Choose According to Your Passion”. http://programmingethicalhackerway.blogspot.in/
  • 8. Hackers profession in detail - A computer hacker is someone who hack machine or computer - A exploit writer is someone who exploit the vulnerability of a program - A shellcoder is someone who writes shellcodes that can be injected in an application and returns a remote (or local) shell when executed - A security researcher is someone who finds the security hole in the system and makes it secure. http://programmingethicalhackerway.blogspot.in/
  • 9. …..Continue - A reverse engineer is someone who breaks the compiled code for ethical or unethical purpose. - A virus and malware writer is someone who writes the malicious code with malicious intentions. - A web-application hacker is someone who hack websites or find web-application vulnerabilities. - A network hacker is someone who hack network like sniffing, pack-crafting, breaking IDS rules or firewall, packet capturing and more… - I think now you must have an idea about your passion. http://programmingethicalhackerway.blogspot.in/
  • 10. Professional Ethical Hacking course - CEH(certified ethical hacker):The Certified Ethical Hacker is a professional certification, provided by the EC-Council. - SANS Security : SANS is by far the largest source for information security training and security certification in the world. - Offensive security: Offensive security offer many types of information security certification courses like OSCP(offensive security certified professional),OSEE... http://programmingethicalhackerway.blogspot.in/
  • 11. Resources : Books - Google might not help for Proper resources of learning hacking. - Here i will share my experience - So let’s start……. http://programmingethicalhackerway.blogspot.in/
  • 12. Books: for learning hacking - Hacking: The Art of Exploitation : very good book on the subject of hacking. - The Hacker's Underground Handbook :If you are coming from a position of absolutely no knowledge of the hacking, this may be useful to you. - Gray Hat Hacking -The Ethical Hackers Handbook - Violent python -A Cookbook for Hackers :great for those who are new to the python language and would like example use cases of simplistic security tools - Black Hat Python-Python Programming for Hackers and Pentesters :explores the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy Trojans. http://programmingethicalhackerway.blogspot.in/
  • 13. Books: for Reverse Engineer - Reversing - Secrets of Reverse Engineering: walked you through the techniques which can be used in reverse/anti-reverse software. - The.IDA.Pro.Book.2nd.Edition : this is a book on how to use IDA, not a book on how to read dis-assembly. - Gray Hat Python- Python Programming for Hackers and Reverse Engineers - Hacker Disassembling Uncovered-Powerful Techniques To Safeguard Your Programming : a good primer to the art of reverse engineering and deals with how to go about disassembling a program with holes without its source code - Programming from the ground up : takes you a step at a time through assembly language concepts http://programmingethicalhackerway.blogspot.in/
  • 14. Books: for Shellcoding and exploit - A Bug Hunter's Diary : gives valuable insights on different techniques of bug hunting and exploiting them successfully - Sockets, Shellcode, Porting & Coding : divided into 5 main categories with each category representing a major skill set required by most security professionals. - The.Shellcoders.Handbook.2nd.Edition : This is a very good book on software vulnerabilities. - Exploiting Software- How to Break Code : describes basic attacks on application software. - Buffer Overflow Attacks - Detect, Exploit, Prevent : This book clearly explains the basics of stack overflow, off by one, heap overflow and string format attacks. http://programmingethicalhackerway.blogspot.in/
  • 15. Books: for Web-Hacking - The.Web.Application.Hackers.Handbook :This is by far the best book I've ever read on web application security. If you do any type of professional Web Application Assessments then this is your bible. - Botnets The Killer Web Applications Hacking :This is the first book to explain the newest internet threat Botnets, zombie armies, bot herders. - OWASP :The Open Web Application Security Project is an online community dedicated to web application security. http://programmingethicalhackerway.blogspot.in/
  • 16. Important Toolkit for Hackers - Kali-linux : Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.It has more than 300 penetration testing tools. - Metasploit : most advanced and popular Framework that can be used to for pen-testing. - Namp : very popular tool that predominantly aids in understanding the characteristics of any target network. - Wireshark : Wireshark is a network packet analyzer.A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible - Nessus : Nessus is a great tool designed to automate the testing and discovery of known security problems. http://programmingethicalhackerway.blogspot.in/
  • 17. …..Continue - Cain & Abel :Cain and abel is one of best Tool that is commonly used to Poison the network If cracking encrypted passwords or network keys is what you need, then Cain & Abel is the tool for you. - John The Ripper : This is the most powerful password cracker tool. - Acunetix : Acunetix is essentially a web vulnerability scanner targeted at web applications. It provides SQL injection, cross site scripting testing, PCI compliance reports etc. - Burp Suite : This tool is used to performing a Web Application Penetration Test. - Havij pro : Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. http://programmingethicalhackerway.blogspot.in/
  • 18. Final words…. - Here I share my whole experience with you.Hope this guide will help you. - In your hacking journey, you will face many challenges. Always one thing keep in mind ”Don’t give up” - Sometime frustration stage comes where you need “Be patient” - Always “Face challenges smartly” - You Won’t become an hacker overnight; it takes years of practice and real world experience to become professional hacker. http://programmingethicalhackerway.blogspot.in/
  • 19. Contact ME: - Follow Me on Google+ : SANDEEP SAINI - Visit My Blog : Programming:Ethical Hacker Way - Like blog on facebook :Programming:Ethical Hacker Way http://programmingethicalhackerway.blogspot.in/
  • 20. The end Let’s start your hacker journey and enjoy it…….. Best Wishes http://programmingethicalhackerway.blogspot.in/