SlideShare a Scribd company logo
1 of 20
Complete guide to
become an Ethical Hacker
http://programmingethicalhackerway.blogspot.in/
Who is ethical hacker?
- A hacker is someone who exploit the
vulnerability in system.
- A ethical hacker is someone who exploit the
vulnerability in system with permission of
owner.
- The ethical hackers may also known as grey
hat or white hat hackers .
http://programmingethicalhackerway.blogspot.in/
may I become a hacker ?
- YES.. Everyone can become a hacker.
- Always think like a hacker.
- A hacker thinks how it works, what if it is not
so, what if i do so, It works in my control
- A hacker is curious to learn, keep
patience,deeply aspiring to learn.
- In simple words, with zero technical
knowledge everyone can become a hacker.
http://programmingethicalhackerway.blogspot.in/
What needs to learn to hacker?
- Learn about computer system
- hacker should have good knowledge about
operating systems(Unix and Windows)
- Learn Programming
- computer hacker : C/C++,Python,Assembly
- web hacker : HTML, Javascript, PHP, SQL
- Learn Networking.
- Join Hacker Forums.
http://programmingethicalhackerway.blogspot.in/
Resources to learn
- Programming
- C programming in hacker way
- Assembly programming in hacker way
- Python programming in hacker way
- Networking for hackers
- Join hackers forums on social websites like Facebook, Twitter.
- Some facebook groups recommend :
- Programming : Hacker's Way
- H4cK!nG: F0r B3g!nn3r
- Security Researchers
- join ethical hacking communities like HackThisSite, Black-Hat Forums etc.
http://programmingethicalhackerway.blogspot.in/
Hacker Profession
- As a doctor have a special profession like Dentist,
Allergist, Surgeon... the hacker have also a special
profession.
- The hackers profession are exploit writer, vulnerability
researcher, security researcher, shellcode writer,
reverse engineer, virus and malware writer, penetration
tester, network hacker, web-application hacker,
computer hacker and many more….
- a simple mean of hacker is penetration tester who
enters the system.
http://programmingethicalhackerway.blogspot.in/
Which hacker profession should elect ?
- i would recommend “Choose
According to Your Passion”.
http://programmingethicalhackerway.blogspot.in/
Hackers profession in detail
- A computer hacker is someone who hack machine or
computer
- A exploit writer is someone who exploit the vulnerability
of a program
- A shellcoder is someone who writes shellcodes that can
be injected in an application and returns a remote (or
local) shell when executed
- A security researcher is someone who finds the security
hole in the system and makes it secure.
http://programmingethicalhackerway.blogspot.in/
…..Continue
- A reverse engineer is someone who breaks the
compiled code for ethical or unethical purpose.
- A virus and malware writer is someone who writes the
malicious code with malicious intentions.
- A web-application hacker is someone who hack
websites or find web-application vulnerabilities.
- A network hacker is someone who hack network like
sniffing, pack-crafting, breaking IDS rules or firewall,
packet capturing and more…
- I think now you must have an idea about your passion.
http://programmingethicalhackerway.blogspot.in/
Professional Ethical Hacking course
- CEH(certified ethical hacker):The Certified Ethical
Hacker is a professional certification, provided by the
EC-Council.
- SANS Security : SANS is by far the largest source for
information security training and security certification in
the world.
- Offensive security: Offensive security offer many types
of information security certification courses like
OSCP(offensive security certified professional),OSEE...
http://programmingethicalhackerway.blogspot.in/
Resources : Books
- Google might not help for Proper resources
of learning hacking.
- Here i will share my experience
- So let’s start…….
http://programmingethicalhackerway.blogspot.in/
Books: for learning hacking
- Hacking: The Art of Exploitation : very good book on the subject of
hacking.
- The Hacker's Underground Handbook :If you are coming from a position
of absolutely no knowledge of the hacking, this may be useful to you.
- Gray Hat Hacking -The Ethical Hackers Handbook
- Violent python -A Cookbook for Hackers :great for those who are new
to the python language and would like example use cases of simplistic
security tools
- Black Hat Python-Python Programming for Hackers and Pentesters
:explores the darker side of Python's capabilities writing network sniffers,
manipulating packets, infecting virtual machines, creating stealthy Trojans.
http://programmingethicalhackerway.blogspot.in/
Books: for Reverse Engineer
- Reversing - Secrets of Reverse Engineering: walked you through the
techniques which can be used in reverse/anti-reverse software.
- The.IDA.Pro.Book.2nd.Edition : this is a book on how to use IDA, not a
book on how to read dis-assembly.
- Gray Hat Python- Python Programming for Hackers and Reverse
Engineers
- Hacker Disassembling Uncovered-Powerful Techniques To Safeguard
Your Programming : a good primer to the art of reverse engineering and
deals with how to go about disassembling a program with holes without its
source code
- Programming from the ground up : takes you a step at a time through
assembly language concepts
http://programmingethicalhackerway.blogspot.in/
Books: for Shellcoding and exploit
- A Bug Hunter's Diary : gives valuable insights on different techniques of
bug hunting and exploiting them successfully
- Sockets, Shellcode, Porting & Coding : divided into 5 main categories
with each category representing a major skill set required by most security
professionals.
- The.Shellcoders.Handbook.2nd.Edition : This is a very good book on
software vulnerabilities.
- Exploiting Software- How to Break Code : describes basic attacks on
application software.
- Buffer Overflow Attacks - Detect, Exploit, Prevent : This book clearly
explains the basics of stack overflow, off by one, heap overflow and string
format attacks.
http://programmingethicalhackerway.blogspot.in/
Books: for Web-Hacking
- The.Web.Application.Hackers.Handbook :This is by far the best book
I've ever read on web application security. If you do any type of
professional Web Application Assessments then this is your bible.
- Botnets The Killer Web Applications Hacking :This is the first book to
explain the newest internet threat Botnets, zombie armies, bot herders.
- OWASP :The Open Web Application Security Project is an online
community dedicated to web application security.
http://programmingethicalhackerway.blogspot.in/
Important Toolkit for Hackers
- Kali-linux : Kali Linux is an advanced Penetration Testing and Security
Auditing Linux distribution.It has more than 300 penetration testing tools.
- Metasploit : most advanced and popular Framework that can be used to
for pen-testing.
- Namp : very popular tool that predominantly aids in understanding the
characteristics of any target network.
- Wireshark : Wireshark is a network packet analyzer.A network packet
analyzer will try to capture network packets and tries to display that packet
data as detailed as possible
- Nessus : Nessus is a great tool designed to automate the testing and
discovery of known security problems.
http://programmingethicalhackerway.blogspot.in/
…..Continue
- Cain & Abel :Cain and abel is one of best Tool that is commonly used to
Poison the network If cracking encrypted passwords or network keys is
what you need, then Cain & Abel is the tool for you.
- John The Ripper : This is the most powerful password cracker tool.
- Acunetix : Acunetix is essentially a web vulnerability scanner targeted at
web applications. It provides SQL injection, cross site scripting testing, PCI
compliance reports etc.
- Burp Suite : This tool is used to performing a Web Application Penetration
Test.
- Havij pro : Havij is an automated SQL Injection tool that helps penetration
testers to find and exploit SQL Injection vulnerabilities on a web page.
http://programmingethicalhackerway.blogspot.in/
Final words….
- Here I share my whole experience with you.Hope this
guide will help you.
- In your hacking journey, you will face many challenges.
Always one thing keep in mind ”Don’t give up”
- Sometime frustration stage comes where you need
“Be patient”
- Always “Face challenges smartly”
- You Won’t become an hacker overnight; it takes years
of practice and real world experience to become
professional hacker.
http://programmingethicalhackerway.blogspot.in/
Contact ME:
- Follow Me on Google+ : SANDEEP SAINI
- Visit My Blog : Programming:Ethical
Hacker Way
- Like blog on facebook :Programming:Ethical
Hacker Way
http://programmingethicalhackerway.blogspot.in/
The end
Let’s start your hacker journey and
enjoy it……..
Best Wishes
http://programmingethicalhackerway.blogspot.in/

More Related Content

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Featured

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Complete guide to become an ethical hacker !

  • 1. Complete guide to become an Ethical Hacker http://programmingethicalhackerway.blogspot.in/
  • 2. Who is ethical hacker? - A hacker is someone who exploit the vulnerability in system. - A ethical hacker is someone who exploit the vulnerability in system with permission of owner. - The ethical hackers may also known as grey hat or white hat hackers . http://programmingethicalhackerway.blogspot.in/
  • 3. may I become a hacker ? - YES.. Everyone can become a hacker. - Always think like a hacker. - A hacker thinks how it works, what if it is not so, what if i do so, It works in my control - A hacker is curious to learn, keep patience,deeply aspiring to learn. - In simple words, with zero technical knowledge everyone can become a hacker. http://programmingethicalhackerway.blogspot.in/
  • 4. What needs to learn to hacker? - Learn about computer system - hacker should have good knowledge about operating systems(Unix and Windows) - Learn Programming - computer hacker : C/C++,Python,Assembly - web hacker : HTML, Javascript, PHP, SQL - Learn Networking. - Join Hacker Forums. http://programmingethicalhackerway.blogspot.in/
  • 5. Resources to learn - Programming - C programming in hacker way - Assembly programming in hacker way - Python programming in hacker way - Networking for hackers - Join hackers forums on social websites like Facebook, Twitter. - Some facebook groups recommend : - Programming : Hacker's Way - H4cK!nG: F0r B3g!nn3r - Security Researchers - join ethical hacking communities like HackThisSite, Black-Hat Forums etc. http://programmingethicalhackerway.blogspot.in/
  • 6. Hacker Profession - As a doctor have a special profession like Dentist, Allergist, Surgeon... the hacker have also a special profession. - The hackers profession are exploit writer, vulnerability researcher, security researcher, shellcode writer, reverse engineer, virus and malware writer, penetration tester, network hacker, web-application hacker, computer hacker and many more…. - a simple mean of hacker is penetration tester who enters the system. http://programmingethicalhackerway.blogspot.in/
  • 7. Which hacker profession should elect ? - i would recommend “Choose According to Your Passion”. http://programmingethicalhackerway.blogspot.in/
  • 8. Hackers profession in detail - A computer hacker is someone who hack machine or computer - A exploit writer is someone who exploit the vulnerability of a program - A shellcoder is someone who writes shellcodes that can be injected in an application and returns a remote (or local) shell when executed - A security researcher is someone who finds the security hole in the system and makes it secure. http://programmingethicalhackerway.blogspot.in/
  • 9. …..Continue - A reverse engineer is someone who breaks the compiled code for ethical or unethical purpose. - A virus and malware writer is someone who writes the malicious code with malicious intentions. - A web-application hacker is someone who hack websites or find web-application vulnerabilities. - A network hacker is someone who hack network like sniffing, pack-crafting, breaking IDS rules or firewall, packet capturing and more… - I think now you must have an idea about your passion. http://programmingethicalhackerway.blogspot.in/
  • 10. Professional Ethical Hacking course - CEH(certified ethical hacker):The Certified Ethical Hacker is a professional certification, provided by the EC-Council. - SANS Security : SANS is by far the largest source for information security training and security certification in the world. - Offensive security: Offensive security offer many types of information security certification courses like OSCP(offensive security certified professional),OSEE... http://programmingethicalhackerway.blogspot.in/
  • 11. Resources : Books - Google might not help for Proper resources of learning hacking. - Here i will share my experience - So let’s start……. http://programmingethicalhackerway.blogspot.in/
  • 12. Books: for learning hacking - Hacking: The Art of Exploitation : very good book on the subject of hacking. - The Hacker's Underground Handbook :If you are coming from a position of absolutely no knowledge of the hacking, this may be useful to you. - Gray Hat Hacking -The Ethical Hackers Handbook - Violent python -A Cookbook for Hackers :great for those who are new to the python language and would like example use cases of simplistic security tools - Black Hat Python-Python Programming for Hackers and Pentesters :explores the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy Trojans. http://programmingethicalhackerway.blogspot.in/
  • 13. Books: for Reverse Engineer - Reversing - Secrets of Reverse Engineering: walked you through the techniques which can be used in reverse/anti-reverse software. - The.IDA.Pro.Book.2nd.Edition : this is a book on how to use IDA, not a book on how to read dis-assembly. - Gray Hat Python- Python Programming for Hackers and Reverse Engineers - Hacker Disassembling Uncovered-Powerful Techniques To Safeguard Your Programming : a good primer to the art of reverse engineering and deals with how to go about disassembling a program with holes without its source code - Programming from the ground up : takes you a step at a time through assembly language concepts http://programmingethicalhackerway.blogspot.in/
  • 14. Books: for Shellcoding and exploit - A Bug Hunter's Diary : gives valuable insights on different techniques of bug hunting and exploiting them successfully - Sockets, Shellcode, Porting & Coding : divided into 5 main categories with each category representing a major skill set required by most security professionals. - The.Shellcoders.Handbook.2nd.Edition : This is a very good book on software vulnerabilities. - Exploiting Software- How to Break Code : describes basic attacks on application software. - Buffer Overflow Attacks - Detect, Exploit, Prevent : This book clearly explains the basics of stack overflow, off by one, heap overflow and string format attacks. http://programmingethicalhackerway.blogspot.in/
  • 15. Books: for Web-Hacking - The.Web.Application.Hackers.Handbook :This is by far the best book I've ever read on web application security. If you do any type of professional Web Application Assessments then this is your bible. - Botnets The Killer Web Applications Hacking :This is the first book to explain the newest internet threat Botnets, zombie armies, bot herders. - OWASP :The Open Web Application Security Project is an online community dedicated to web application security. http://programmingethicalhackerway.blogspot.in/
  • 16. Important Toolkit for Hackers - Kali-linux : Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.It has more than 300 penetration testing tools. - Metasploit : most advanced and popular Framework that can be used to for pen-testing. - Namp : very popular tool that predominantly aids in understanding the characteristics of any target network. - Wireshark : Wireshark is a network packet analyzer.A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible - Nessus : Nessus is a great tool designed to automate the testing and discovery of known security problems. http://programmingethicalhackerway.blogspot.in/
  • 17. …..Continue - Cain & Abel :Cain and abel is one of best Tool that is commonly used to Poison the network If cracking encrypted passwords or network keys is what you need, then Cain & Abel is the tool for you. - John The Ripper : This is the most powerful password cracker tool. - Acunetix : Acunetix is essentially a web vulnerability scanner targeted at web applications. It provides SQL injection, cross site scripting testing, PCI compliance reports etc. - Burp Suite : This tool is used to performing a Web Application Penetration Test. - Havij pro : Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. http://programmingethicalhackerway.blogspot.in/
  • 18. Final words…. - Here I share my whole experience with you.Hope this guide will help you. - In your hacking journey, you will face many challenges. Always one thing keep in mind ”Don’t give up” - Sometime frustration stage comes where you need “Be patient” - Always “Face challenges smartly” - You Won’t become an hacker overnight; it takes years of practice and real world experience to become professional hacker. http://programmingethicalhackerway.blogspot.in/
  • 19. Contact ME: - Follow Me on Google+ : SANDEEP SAINI - Visit My Blog : Programming:Ethical Hacker Way - Like blog on facebook :Programming:Ethical Hacker Way http://programmingethicalhackerway.blogspot.in/
  • 20. The end Let’s start your hacker journey and enjoy it…….. Best Wishes http://programmingethicalhackerway.blogspot.in/