As you learn in previous blog what is ethical hacker and is it safe for us or not now we will continue to how to become hacker and required skills step by step guide
Let's Start
1.Learn Basic Computer Skills
Maybe All Computer Basic Topics Cover In Below List ( We Will Discuss All Topics Step By Step In Detailed )
Step By Step All Topics Cover In Upcoming Blogs So Don't Worry
--> What Is Computer
--> Why We Need Computer
--> Computer History
--> How Computer Works
--> Input Unit
--> Storage Unit
--> Processing Unit
--> Output Unit
--> Controlling Unit
--> What Is Software
--> Types Of Software
--> Types Of Printers
--> Computer Memory Units
--> Types Of Computer
--> What Is Primary And Secondary Memory
--> What Is Rooting??
--> What Is HDD,SDD,SSHD
--> What Is Operting System
--> Types Of Operting System
--> How Operting System Works
--> What Is Boot
--> What Is MBR/GPT
--> Virtualization
--> Buffers
--> EXT2/3/4
--> SWAP/NTFS
--> What Is File System
--> 32bit/64 bit
--> What Is legacy/UEFI
--> Processes And Threads
--> How to Know Your Computer Runs on MBR/GPT
--> What Is Ram And It's Types
--> What Is Rom And It's Types
--> What Is Cache
--> What Is Internal Devices
--> What Is External Devices
--> What Is Partitions
--> How to Make Bootable Pendrive
--> How to Install Windows Using Bootable Pendrive or Cd
--> What Is MS-DOC
--> MS-DOC Commands
--> Master In MS-DOC
--> What Is CPU
--> How works CPU
--> What Is BIOS
--> How Modify BIOS
--> How to enable virtualization in the BIOS
--> Difference Between Killing a thread vs killing a process
2.Networking
Step By Step All Topics Cover In Upcoming Blogs So Don't WorryMaybe All Topics Cover In Below List
--> What Is Internet
--> How Works Internet
--> OSI Model
--> TCP/IP
--> What is node
--> NAT
--> What Is IP
--> Types Of IP Address
--> Private IP
--> Public IP
--> What is loopback Address
--> What Is 127.0.0.1
--> What Is Port Forwarding
--> Network Types
--> HTTP/HTTPS
--> SNMP Protocol
--> Hub,Switch,Router,Bridge,Repeter, Gateway
--> What Is Duplex And Types Of Duplex
--> What Is Topology And It's Types
--> Modem
--> What IS MAC Address
--> Subnetting
--> Routing & Switching
--> vLAN
--> Network Protocols
--> TCP/UDP
--> ARP
--> DNS
--> Wireless
--> DHCP
--> What is Wi-Fi
--> What Is Bluetooth
--> LAN
--> Packet Analysis
--> Packet Sniffing
--> VPN
--> What Is NIC
--> What Is Wireless Access Point
--> Peer To Peer Network
--> Transmission Media
3.Different OS Knowledge Like Windows/MacOS, Linux
Step by Step All Topics Cover In Upcoming Blogs So Don't Worry
Maybe All Topics Cover In Below List
1.Windows
--> MS-DOC
--> Registry
--> Volume Shadow Copies
--> UAC
--> Memory Paging
--> .msi vs .exe
--> DLLS
--> RIDs
--> SIDs
--> Tokens
--> Network Profiles
--> Servers vs Workstation
--> Commands
--> Netstat
--> whoami
--> ping
--> ipconfig
--> PowerShell Remoting
--> Sysinternals Software
--> Ability to look for network connections and their related processes
2.Linux
--> What Is Kernel
--> What Is Hardware
--> How Linux Works
--> Types Of Linux
--> Which Linux Is Best For Hackers
--> Directory
--> What Is Terminal
--> Why Linux Best For Hackers
--> Install/Updating System Packages
--> Software Repositories
--> Permissions
--> Mounting Drives & Devices
--> Sudo Accounts
--> /etc/shadow and /etc/passwd
--> ssh
--> telnet
--> ftp
--> Creating Directories & Files Using Command
--> familiar with command line
--> What Is GUI/CUI and which is best
--> Bash Scripting
--> Networking In Linux
4.Programming Languages and Scripting
--> HTML
--> CSS
--> JavaScript
--> Java
--> Bash
--> Python
--> Go
--> PowerShell
--> C
--> C++
--> C#
--> Perl
--> Ruby
--> SQL
--> PHP
--> VBScript
--> Visual Basic
5. Basic Hardware Knowledge
Computer hardware comprises the physical parts of a computer, like the central processing unit (CPU), monitor, mouse, keyboard, computer data storage,
graphics card, sound card, speakers and motherboard, etc. By contrast, the software is the set of instructions that can be stored and run by hardware.
For example, suppose one wants to hack a machine that is controlled by a computer. First, he needs to know about the machine or how it works. Last,
he has to get access to the computer that controls the machine. Now, the machine will have a very good software security system; however, hackers
don’t care about hardware security, so he can play with the hardware if he can access it. If one doesn’t know about hardware, then how will he/she
know how the motherboard works, how USBs to transfer data, or how CMOS or BIOS work together, etc.? So one must have basic hardware knowledge also to become an ethical hacker.
6. Adopting Hacking Attitudes
--> Think Creatively--> Solving Problems
--> Recognize and fight authority
--> Be competent
--> Spend More Time With Computer
7.Database Learning
--> MySQL
--> MariaDB
8..Cyber Law
--> Learn Cyber Law And IT Acts
9.Cryptography
--> Protect Own Program Using Cryptography
--> Crack Another Program Or Hash Using Cryptography
10.Social engineering
--> Social Engineering is a manipulation technique that exploits human error to gain private information, access. or valuables
11.Reverse Engineering
--> Protect Ransomware Attack using Reverse Engineering
Comment If U Want All Above Topic In Detailed In Upcoming Blogs (Step By Step)
Stay Active
Previous Blog :- What Is Ethical Hacking And Why Ethical Hacking Is Important??
Next Blog :- Discuss About Hacking All Module And Their Topics
0 Comments:
Post a Comment