Learn how to get started with ethical hacking and cyber security in simple steps.
How To Get Started With Ethical Hacking
Why you want to Learn it ?
Yes it is the right time to ask yourself that why do you want to learn about ethical hacking is it just your interest or you look forward to take cyber security as a career option.
In order to learn and perform practicals we need some resources
Well the most important thing we need is a computer system to work on with an active internet connection.
The second and the last thing is an smartphone with active internet connection.
Information Resource Management
The next important step is to know how to gather information from various resources. These information resources are as follows
- PDF, E-BOOKS AND BOOKS
- YOUTUBE TUTORIALS
- DARK WEB
- ONLINE COURSES
- OFFLINE COURSES
Start From Basics
It is always a good option to start with basics, learning how to operate linux, getting started with programming languages such as Python, Java etc.
- Learn to operate linux
- Learn programming language such as python.
- Google Dorking
- Understanding Different Networking Protocols
Learning the structure – Phases Of Hacking
There are five phases of hacking as follows –
Information Gathering (Reconnaissance)
- Information gathering about your target is the first step in ethical hacking.
- We need to gather as much information as possible about our target.
- Information gathering (Reconnaissance) is also known as footprinting.
- Information Gathering is of two types as follows
- Active Information Gathering.
- Passive Information Gathering.
This process is done by various information gathering tools available on kali linux as follows
- Ghost Phisher
Scanning (Vulnerability Analysis)
Scanning is done in order to scan the network, ip address, accounts available on the target computer.
Hackers try to look for any kind of information which can help him to perform attack.
A good scanning process may lead to disclosure of certain vulnerabilities and loopholes which can be used as an advantage over the target.
Famous vulnerability analysis tools are as follows
Gaining Access (Exploitation)
Gaining access is the hardest part of all as it totally depends upon the skills and techniques used by an hacker in order to gain access of the target computer.
This process involves talking advantages of the vulnerabilities and loopholes found in target network or computer while the process of scanning.
Vulnerabilities and loopholes get exploited and a hacker tries to take administrative privileges over the system in order to do modifications.
Famous exploitation tools available on kali linux is as follows
- Metasploit Framework
Once a hacker gains an access to a system the next step is to maintain that access for future exploitation and attacks.
Hacker take the help of Rootkits, Trojans or Malwares in order to maintain persistence access to the system.
This is done by various methods, different exploitation tools as well as forensic tools are used.
Metasploit Framework is the most used tool for maintaining the access.
Clearing The Track
It’s easy to understand that no hacker would like to get caught for his activity.
After maintaining the access the next step is to clear all the records of the past activities done by hacker.
This kind of records may include data like sent and received emails, call logs, modifying registry values, deleting temporary files etc.