How to become a hacker?

Hacking has been a hot topic in recent years and has caught the attention of many aspiring tech enthusiasts. Hacking requires a combination of technical skills and a deep understanding of computer systems and networks. Whether you want to become a professional ethical hacker or just want to expand your knowledge, this blog will provide you with a roadmap to help you achieve your goals. So, let's dive into the exciting world of hacking and learn how to become a successful hacker.

## Learning Part...

# Level-1: RESEARCH AND RESOURCES

  • The Art of Googling
  • Never give up Attitude, Patience and Consistency.
  • Know How to Find Resources
  • Read Articles and Blogs about Cybersec, Watch videos on new Tech and their Vulnerabilities.
  • Keep up with News and Updates in Cybersec field, what type of new attacks are happening.
  • Find Courses and Books that will teach you specific topics in-depth.

# Level-2: FUNDAMENTALS

1. LINUX BASICS

  • Linux Directory Structure
  • Familiarity of Environment
  • Basic Linux Terminal Commands
  • Manage Permission
  • Manage Linux Users and Groups
  • Manage and Monitor the Linux Services and Processes

2. WINDOWS BASICS

  • Groups and Policies
  • Active Directory
  • Basics of Powershell
  • Windows Services and Vulnerabilities

3. WEB APPLICATION BASICS

  • Understanding of URL
  • Role of Client and Server
  • How Request and Response Works
  • Request Header and Response Header
  • Catching Service and Catche
  • Web App Technology
  • Web App Vulnerabilities

4. PYTHON FUNDAMENTALS

  • Basic Syntax
  • Working of Loop
  • Working of if-else
  • List, Tuple and Dictionaries
  • Basics of Functions
  • Files I/O
  • Exception Heading
  • Socket Programming

5. BASICS OF SERVER

  • What is Server
  • Types of Server
  • How Passwords are Stored
  • How Server Works

6. BASICS OF NETWORKING

  • Protocol Services and Port no.
  • 3-way Handshake
  • TCP Headers and UDP Headers
  • Secure Socket Layer
  • OSI Layers
  • Network Topologies
  • TCP/IP Protocol
  • Subnetting
  • Tunneling
  • Network Sevice Vulnerabilities

# Level-3: TOOLS

  • Metasploit
  • Nmap
  • Burp suite
  • Wappalyzer
  • Cain and Abel
  • Cyberchef
  • Pydictor
  • Maltego
  • OWASP ZAP
  • theHarvester

# Level-4: VULNERABLE MACHINE

  • OverTheWire
  • DVWA
  • PicoCTF
  • VulnHub
  • HackTheBox
  • HackThisSite

Level-5: A+ TOPICS

  • Buffer Overflow
  • Linux Commands and Privilege Escalation
  • Windows Commands and Privilege Escalation
  • Windows Kernel Exploits
  • Linux Kernel Exploits

## Resources


## C|EH Cources Information

1) CEH Course Eligibility:

There are two paths that applicants can choose from to be eligible for the final C|EH exam.
The first is to attend an official EC-Council training course, which is designed for all skill levels.
The training course does not require previous cybersecurity experience.

The second path allows applicants with at least 2 years of previous information security experience to skip the course and go directly to taking the certification exam. Applicants must first submit evidence of their previous experience and should have knowledge in the following fields:

  • Information security and ethical hacking
  • Reconnaissance techniques
  • System hacking phases and attack techniques
  • Network and perimeter hacking
  • Web application hacking
  • Wireless network hacking
  • Mobile platform, IoT, and operational technology (OT) hacking
  • Cloud computing
  • Cryptography

2) Course Duration:

EC-Council has designed this course as a bootcamp to accelerate your journey to becoming a C|EH.
The 5-day, 40-hour program is designed to maximize learning and get you ready for action as soon as possible.

At the end of the course, you'll need to pass a 4-hour exam composed of multiple-choice questions that test what you have learned.
Once you pass the C|EH exam, you'll have the opportunity to continue sharpening your ethical hacking skills and achieve further recognition in the field of ethical hacking with the C|EH (Master) credential.

3) The Certified Ethical Hacker (Master) Credential:

The C|EH (Master) certification is the next step for top C|EHs.
Those who earn the C|EH (Master) credential have proven their proficiency, confidence, and in-depth comprehension of ethical hacking through their outstanding performance on the 6-hour C|EH (Practical), a rigorous, hands-on exam in a live network environment that challenges participants to put their knowledge to the test.

The C|EH (Master) credential proves to current and future employers that the holder's information security abilities are of the highest caliber.
While there are no specific eligibility criteria for the C|EH (Practical), candidates are strongly recommended to first take the C|EH course.
In order to earn the C|EH (Master) certification, participants must pass both the C|EH certification exam and the C|EH (Practical).


# Sources

Comments



Thanks For Reading