betrayed

hacking:beginner

Jul 24th, 2019
293
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.72 KB | None | 0 0
  1. +-========================================================-+
  2. | ::::::::: STEPS ON HOW TO BECOME A GOOD HACKER ::::::::: |
  3. +-========================================================-+
  4. | _____ __ __ __ __ |
  5. | / ___/__ ___ ___/ / / // /__ _____/ /_____ ____ |
  6. | / (_ / _ \/ _ \/ _ / / _ / _ `/ __/ '_/ -_) __/ |
  7. | \___/\___/\___/\_,_/ /_//_/\_,_/\__/_/\_\\__/_/ |
  8. | ______ |
  9. | / __/ /____ ___ ___ |
  10. | _\ \/ __/ -_) _ \(_-< |
  11. | /___/\__/\__/ .__/___/ |
  12. | /_/ |
  13. +-========================================================-+
  14. | 1) Learn TCP/IP, Basic Information gathering, Proxies, |
  15. | Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH. |
  16. | |
  17. | 2) Learn Linux, Unix, Windows - You can do this using |
  18. | vmware or any virtual desktop utility. |
  19. | |
  20. | 3) Learn a programming language that's compatible with |
  21. | all OS - Perl, Python, C, ASM |
  22. | |
  23. | 4) Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI |
  24. | RFI, LFI |
  25. | |
  26. | 5) Learn Reverse engineering and crack some programs for |
  27. | serials easy ones like mirc, winzip, winrar or old |
  28. | games. |
  29. | |
  30. | 6) Code a fuzzer for common protocols - ftp, pop3, 80, |
  31. | 8080 - Pick some free software like ftp server, mail |
  32. | server, apache or iis webserver or a webserver all-in- |
  33. | one pack, or teamspeak, ventrilo, mumble. |
  34. | |
  35. | 7) Code a tool that uses grep to sort out unique code in |
  36. | source codes. |
  37. | |
  38. | 8) Make a custom IPtable, IPsec firewall that blocks all |
  39. | incoming traffic and out going traffic and add filters |
  40. | to accept certain ports that your software or scripts |
  41. | use. |
  42. | |
  43. | 9) Pick a kernel in linux or unix, also pick a Microsoft |
  44. | OS version lets say Winxp pro sp2 put them on the |
  45. | virtual desktops (vmware) and find and code a new local |
  46. | exploit in those versions, then install a Apache |
  47. | webserver on the Linux/Unix and a IIS webserver on the |
  48. | winxp pro and attempt to find and code a new local |
  49. | reverse_tcp_shell exploit. |
  50. | |
  51. | 10) Learn Cisco Router and Switch configuration and |
  52. | setup. |
  53. | |
  54. | 11) Learn Checkpoint Setup and Config |
  55. | |
  56. | 12) Learn Wifi scanning, cracking, sniffing. |
  57. | |
  58. | 13) Pick a person in you phonebook for the area code you |
  59. | live in or city then ring the person on a anonymous line |
  60. | like skype or a payphone or a carded sim and attempt to |
  61. | social engineer the person for his name, address, data |
  62. | of birth, city born, country born, ISP connected with, |
  63. | Phone company connected with, What bank he/she uses and |
  64. | anything else you can get. Then Attempt to ring using a |
  65. | spoof caller ID software with the person's phone number- |
  66. | call the ISP and try reset the password to his/her |
  67. | internet connection/web-mail, get access to bank account |
  68. | or ask them to send out a new *** to a new address |
  69. | (drop) with a new pin, reset of phone company passwords. |
  70. | |
  71. | 14) Use your information gathering skills to get all the |
  72. | information off a website like a shop then use the spoof |
  73. | caller-id software or hack your phone to show a new |
  74. | number of the Webserver's Tech Support number then ring |
  75. | the shop owner and try get the shop site password. |
  76. | |
  77. | 15) Do the same thing but attempt to use a web attack |
  78. | against a site or shop to gain admin access. |
  79. | |
  80. | 16) Once got access upload a shell and attempt to |
  81. | exploit the server to gain root using a exploit you |
  82. | coded not someone else s exploit. |
  83. | |
  84. | 17) Make your own Linux Distro |
  85. | |
  86. | 18) Use your own Linux Distro or use a vanilla Linux |
  87. | gnome (not kde) keep it with not much graphics so you |
  88. | can learn how to depend on the terminal and start from |
  89. | scratch install applications that you will only need for |
  90. | a blackbox (Security test box), make folders for |
  91. | fuzzers, exploits, scanners..etc Then load them up with |
  92. | your own scripts and other tools ( By this stage you |
  93. | shouldn't need to depend on other peoples scripts). |
  94. | |
  95. | 19) Learn macosx and attempt to gain access to a Macosx |
  96. | box whether it be your own or someone's else. |
  97. | |
  98. | 20) Create a secure home network and secure your own |
  99. | systems with your own Security policies and firewall |
  100. | settings. |
  101. | |
  102. | All this isn't a over night learning it will take a nice |
  103. | 3-4 years to learn a bit of this 5+ years to learn most |
  104. | of it and even then you may need time to keep learn as |
  105. | IT keeps changing ever day. As long as your dedicated to |
  106. | learning you won't have any problems and if you learn |
  107. | all that you should easy get a job in any company if you |
  108. | show proof that you can do these things (print out |
  109. | scripts that you made or put on disc) to show the |
  110. | companies. |
  111. +-========================================================-+
Add Comment
Please, Sign In to add comment