This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
wiki:starthacking [2021/09/30 04:54] admin created |
wiki:starthacking [2021/09/30 04:59] (current) admin |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | wiki: | + | ======So, You Want to be a Hacker?====== |
- | Table of Contents | + | |
- | * So, You Want to be a Hacker? | + | ===== What is a hacker? |
- | | + | |
- | | + | |
- | * * What You Should Learn First | + | |
- | * | + | |
- | * | + | |
- | * | + | |
- | * | + | |
- | * | + | |
- | * | + | |
- | * * Capture The Flag! | + | |
- | * * Go to Security Conferences or find a local infosec group | + | |
- | | + | |
- | So, You Want to be a Hacker? | ||
- | What is a hacker? | ||
The term Hacker was originally coined as a way to describe an individual that experiments with technology. Over the past few decades, the media has subverted this term to have negative connotations. It is possible to reverse this negative connotation with the advent of “ethical hacking”. | The term Hacker was originally coined as a way to describe an individual that experiments with technology. Over the past few decades, the media has subverted this term to have negative connotations. It is possible to reverse this negative connotation with the advent of “ethical hacking”. | ||
To most hackers, hacking is not about simply subverting a system to gain some type of advantage or service that would otherwise be inaccessible, | To most hackers, hacking is not about simply subverting a system to gain some type of advantage or service that would otherwise be inaccessible, | ||
- | What a hacker is not | + | ===== What a hacker is not ===== |
In general, hackers have a natural inquisitiveness about the world around them, and always have the desire to learn new and interesting ideas. Script Kiddies (skids) are individuals who do not want to learn or do any work, but still would like to reap the benefits from the work of others. This can generally be seen when a skid asks for tools that will automatically do the work for them without any base knowledge required, or for someone else to do the work for them. | In general, hackers have a natural inquisitiveness about the world around them, and always have the desire to learn new and interesting ideas. Script Kiddies (skids) are individuals who do not want to learn or do any work, but still would like to reap the benefits from the work of others. This can generally be seen when a skid asks for tools that will automatically do the work for them without any base knowledge required, or for someone else to do the work for them. | ||
The hacking community has no place for those who are not willing to learn, or at least attempt at understanding why tools work, and the technology that is backing such tools. This is where a lot of skids run into trouble with law enforcement. Not understanding the concept that attempting to break in, modify, steal, or freely distribute services, accounts, and data is illegal and punishable by law. Most skids tend to be mocked for their unwillingness to learn and inability to understand the basics of how the world functions. | The hacking community has no place for those who are not willing to learn, or at least attempt at understanding why tools work, and the technology that is backing such tools. This is where a lot of skids run into trouble with law enforcement. Not understanding the concept that attempting to break in, modify, steal, or freely distribute services, accounts, and data is illegal and punishable by law. Most skids tend to be mocked for their unwillingness to learn and inability to understand the basics of how the world functions. | ||
- | What You Should Learn First | + | ===== What You Should Learn First ===== |
- | Learn Computer Shell Environments | + | |
+ | ==== Learn Computer Shell Environments | ||
Whether one is working on Windows and wishes to learn DOS/ | Whether one is working on Windows and wishes to learn DOS/ | ||
- | Learn to Program | + | ==== Learn to Program |
Automation of trivial tasks, design and execution of malware, as well as the construction of exploits can all be accomplished using programming. Programming is one of the most necessary skills, not only for the direct benefits of writing programs, but learning to program will further one's ability to be brought under the hacker' | Automation of trivial tasks, design and execution of malware, as well as the construction of exploits can all be accomplished using programming. Programming is one of the most necessary skills, not only for the direct benefits of writing programs, but learning to program will further one's ability to be brought under the hacker' | ||
- | Learn Networking | + | ==== Learn Networking |
Networking is the infrastructure over which all computers and connected devices communicate and exchange data. Knowledge of networking is essential in the cyber security field. Understanding the basics of how the internet functions is an important concept. Some of the basics would involve the OSI model, common ports with their associated protocols, standards, topologies, and common network-based attacks. Networking Resources | Networking is the infrastructure over which all computers and connected devices communicate and exchange data. Knowledge of networking is essential in the cyber security field. Understanding the basics of how the internet functions is an important concept. Some of the basics would involve the OSI model, common ports with their associated protocols, standards, topologies, and common network-based attacks. Networking Resources | ||
- | Learn How Computers Function | + | ==== Learn How Computers Function |
How does a CPU intake instructions and execute those instructions? | How does a CPU intake instructions and execute those instructions? | ||
- | Learn Operating System Design | + | ==== Learn Operating System Design |
Understand the how the physical hardware interacts with the software in a way that allows all of the world' | Understand the how the physical hardware interacts with the software in a way that allows all of the world' | ||
- | Be Aware of News | + | ==== Be Aware of News ==== |
Keeping up with hacking news for the latest exploits and vulnerabilities and technology updates is important for anyone involved with hacking or cyber security. | Keeping up with hacking news for the latest exploits and vulnerabilities and technology updates is important for anyone involved with hacking or cyber security. | ||
- | Capture The Flag! | + | ===== Capture The Flag! ===== |
Participating in Capture The Flag (or CTF) challenges is one of the best ways to practice and learn hacking by doing it legally. Try the Laptop Hacking Coffee CTF and join the LHC Discord to ask questions. List of CTF challenges | Participating in Capture The Flag (or CTF) challenges is one of the best ways to practice and learn hacking by doing it legally. Try the Laptop Hacking Coffee CTF and join the LHC Discord to ask questions. List of CTF challenges | ||
- | Go to Security Conferences or find a local infosec group | + | ===== Go to Security Conferences or find a local infosec group ===== |
Security conferences (or cons) are some of the best places to meet other hackers, learn about the latest techniques, see the state of the industry, and participate in CTFs. Check out DEFCON, BlackHat, DerbyCon, Shmoocon, BSides, and many others. Security and Hacking Conferences | Security conferences (or cons) are some of the best places to meet other hackers, learn about the latest techniques, see the state of the industry, and participate in CTFs. Check out DEFCON, BlackHat, DerbyCon, Shmoocon, BSides, and many others. Security and Hacking Conferences | ||
- | Resources | + | ===== Resources |
For a complete list of resources, check our our Resources Wiki Page | For a complete list of resources, check our our Resources Wiki Page |