Learn how to get started with ethical hacking and cyber security in simple steps.

How To Get Started With Ethical Hacking

Why you want to Learn it ?

Yes it is the right time to ask yourself that why do you want to learn about ethical hacking is it just your interest or you look forward to take cyber security as a career option.

Resource Identification

In order to learn and perform practicals we need some resources

Well the most important thing we need is a computer system to work on with an active internet connection.

The second and the last thing is an smartphone with active internet connection.

Information Resource Management

The next important step is to know how to gather information from various resources. These information resources are as follows

  • PDF, E-BOOKS AND BOOKS
  • YOUTUBE TUTORIALS
  • WEBSITES
  • DARK WEB
  • ONLINE COURSES
  • OFFLINE COURSES

Start From Basics

It is always a good option to start with basics, learning how to operate linux, getting started with programming languages such as Python, Java etc.

  • Learn to operate linux
  • Learn programming language such as python.
  • Google Dorking
  • Understanding Different Networking Protocols

Learning the structure – Phases Of Hacking

Watch the video to learn About Structure Of

There are five phases of hacking as follows –

Information Gathering (Reconnaissance)

  • Information gathering about your target is the first step in ethical hacking.
  • We need to gather as much information as possible about our target.
  • Information gathering (Reconnaissance) is also known as footprinting.
  • Information Gathering is of two types as follows
Watch The Video To Know AbOut Types Of Information Gathering In Hindi
  1. Active Information Gathering.
  2. Passive Information Gathering.

This process is done by various information gathering tools available on kali linux as follows

  • Nmap
  • Dnsmap
  • Ghost Phisher
  • Wireshark
  • Recon-ng
  • Goofile
  • Nikto
  • SET

Scanning (Vulnerability Analysis)

Scanning is done in order to scan the network, ip address, accounts available on the target computer.

Hackers try to look for any kind of information which can help him to perform attack.

A good scanning process may lead to disclosure of certain vulnerabilities and loopholes which can be used as an advantage over the target.

Famous vulnerability analysis tools are as follows

  • Lynis
  • Nmap
  • Sqlmap
  • Oscanner
  • Powerfuzzer
  • Sqlninja

Gaining Access (Exploitation)

Gaining access is the hardest part of all as it totally depends upon the skills and techniques used by an hacker in order to gain access of the target computer.

This process involves talking advantages of the vulnerabilities and loopholes found in target network or computer while the process of scanning.

Vulnerabilities and loopholes get exploited and a hacker tries to take administrative privileges over the system in order to do modifications.

Famous exploitation tools available on kali linux is as follows

  • Armitage
  • BeAF
  • Exploitdb
  • Metasploit Framework
  • Commix
  • Routersploit
  • SET

Maintaining Access

Once a hacker gains an access to a system the next step is to maintain that access for future exploitation and attacks.

Hacker take the help of Rootkits, Trojans or Malwares in order to maintain persistence access to the system.

This is done by various methods, different exploitation tools as well as forensic tools are used.

Metasploit Framework is the most used tool for maintaining the access.

Watch The Full Video To Automatically Install Metasploit In Termux(Android)

Clearing The Track

It’s easy to understand that no hacker would like to get caught for his activity.

After maintaining the access the next step is to clear all the records of the past activities done by hacker.

This kind of records may include data like sent and received emails, call logs, modifying registry values, deleting temporary files etc.

One thought on “How To Learn Ethical Hacking ? Step By Step – Ethical Hacking and Cyber Security Guide.”

Leave a Reply

Your email address will not be published. Required fields are marked *