SlideShare a Scribd company logo
1 of 10
How to get started with
Penetration testing aka hacking ;)
Hello, my name is Hamza Mirza. I’m a
cybersecurity enthusiast and a python
developer. In this article, I will explain where to
begin with pen testing, what are the essential
skills and how to approach them.
It is not an easy task to become a hacker. As a hacker, you need to have an
attitude and curiosity. Reading the hacking manifesto can teach you the
attitude of a hacker. Nurturing the hacker attitude is more about developing
competence in the languages rather than having a stereotypical attitude.
Though a lot of people consider that a hacker is a criminal, in real life, they are
hired by big companies for protecting information and minimizing potential
damage. The act of hacking actually is that of being over-curious and
outwitting authority.
The act of stealing something or doing harm to someone is not hacking. Such
people are commonly called crackers in the community. Crackers are involved
in illegal activities and I do not recommend you to get involved into such
activities.
Let’s get started!
Kali Linux to the rescue
Using Kali Linux is probably the easiest (and the shittiest) way of hacking.
If you post the question “How do I become a Hacker” in any forum on the internet, you can
be absolutely certain that someone will tell you to download and install Kali Linux (formerly
known as Backtrack) on your PC and then you are good to go.
Kali is a Linux Distribution with a lot of tools pre-installed and pre-configured. It’s a toolbox.
What you need to ask yourself is. “Would getting a brain surgeon’s toolbox make me a
brain surgeon?” No it wouldn't. Similarly, Kali Linux has been written by other hackers so
using the tools developed by other people makes you nothing but what’s known in the
hacker world as “Script Kiddies”. These people know nothing about hacking and have little
to knowledge of cyber security. So, I wouldn’t recommend using Kali Linux. In your early
days it’s ok to use Kali because it gives a ‘hacker feeling’ but you shouldn’t use it in the long
run.
Using the tools developed by other hackers is not only not going to get you anywhere, It’s
probably going to cause you problems because you really need to know how to install and
configure the tools yourself to be successful in hacking. How else will you handle the
moving on inside the system you have hacked when they don’t have Kali Linux in their
network?
Programming
This is one of the most important skills to have in order to become a Hacker. Everything you
see on your computer is already been programmed in some programming language. So, to
become a Computer Hacker, you must have a deep understanding of the programming
languages.
Start off with Python. It’s simple, it’s easy and it’s powerful. It’s great for tasks’ automation
and writing your own tools.
LEARN TO PROGRAM IN C!!!!
C is perhaps the most versatile programming language. If you can learn to program in C, you
can learn ANY programming language in the world. All operating systems are written in C, so
if you can program in C then you can easily write exploitation tools to hack into any OS. Be it
Windows, Linux or Mac OS X.
There are tons and tons of free C tutorials out there. I’d recommend “C programming –
thenewboston” on YouTube or any of C programming courses on Udemy. However, Udemy is
not entirely free, there are some free and some paid courses.
Networking Concepts
The networking concept needs to be sharp when you want to be a hacker.
Understanding how the networks are created is important, however, you need to know the
differences between different types are networks. Having a clear understanding of TCP/IP
and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.
Understand what is subnet, LAN, WAN and VPN.
The networking commands to do a HTTP request needs to be on your fingertips. The HTTP
protocol, is the gateway through which one enters the internet world. Hence, it is necessary
to learn this protocol in order to break the barriers. The hackers often use the HTTP
gateway to breach the security of the system and take control over it.
Learn how to use all this knowledge with a programming language. All In all, you really
need to have a deep understanding of TCP/IP, DNS, NAT, DNCP, Switching, Routers, Private
and Public IP, Mac address, subnetting, IPv4 and IPv6.
Learn LINUX
Fuck Windows. Seriously, fuck Windows.
The Windows operating system may be easy and convenient for most users, but it is
certainly not suited for hackers. With the exception of few windows only tools, most
hacking tools run best under Linux environment.
Linux is open-source and you’re less likely to get hit with firewalls.
However, I don’t recommend using Linux directly on your computer as a primary OS on
your hard disk (if you want to use it for hacking). Create a Linux live bootable USB or run
Linux on a Virtual Machine
Learn Cryptography
As an expert hacker, you need to understand and master the art of cryptography. The
technology of cryptography and encryption is very important for internet and
networking. It is the practice and study of techniques that are used for secure
communication in the presence of third parties. The encryption is done for various
aspects of information security such as confidentiality of the data, integrity of the data
and authentication. Moreover, the technology of cryptography is extensively used in ATM
cards, computer passwords and e-commerce. While hacking, these encrypted codes
needs to be broken, which is called decryption.
Cryptography is heavily used in SSL based internet communication. An expert hacker
should be able to understand how SSL works and what is the importance of cryptography
in keeping SSL secure.
Try reading about various encryption algorithms and see why they are difficult to
decrypt. Participate in challenges for decrypting a powerful encryption. An expert hacker
will be able to demonstrate weaknesses in a encryption algorithm and should be able to
write a program that can show how decryption can be performed without much
information about keys.
Staying anonymous
The most important thing for a hacker is to remain “anonymous” i.e when you will do any
illegal activities or even any ethical stuff you won’t be caught by cops.
Use a VPN or a proxy.
A VPN like hides your IP by connecting you to another server, a proxy actually does the
same!
You only have to use a VPN or Proxy when you’re doing your activities, after them, you
turn it off.
Let me explain it a bit. People will do everything to find you, so even a little mistake can
lead you to cops or you can be found! You have to put people on a dead track.
Whenever planning to do some hacking stuff you start your PC on with a proxy, and
then do you work and then turn off the proxy after completing the work and don’t
use the internet for 20-30 mins after that, you start it up without any proxy, and do
your legal normal things.

More Related Content

What's hot

Open stack security emea launch
Open stack security   emea launchOpen stack security   emea launch
Open stack security emea launch
Joshua McKenty
 

What's hot (17)

Introduction to python for cybersecurity pythonminna
Introduction to python for cybersecurity  pythonminnaIntroduction to python for cybersecurity  pythonminna
Introduction to python for cybersecurity pythonminna
 
Open stack security emea launch
Open stack security   emea launchOpen stack security   emea launch
Open stack security emea launch
 
Steganography
SteganographySteganography
Steganography
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Client side encryption without knowing its limits is a ticking time bomb!
Client side encryption without knowing  its limits is a ticking time bomb!Client side encryption without knowing  its limits is a ticking time bomb!
Client side encryption without knowing its limits is a ticking time bomb!
 
Eng12
Eng12Eng12
Eng12
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)
 
Password Attack
Password Attack Password Attack
Password Attack
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
 
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
 
Enabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responseEnabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident response
 
Cyber security
Cyber security Cyber security
Cyber security
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 

Similar to Get started with hacking

Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
IndianArmy38
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
IndianArmy38
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
Bruce Wolfe
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 

Similar to Get started with hacking (20)

How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie Hackers
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
 
Paper id 311201535
Paper id 311201535Paper id 311201535
Paper id 311201535
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book Mini
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWCyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
 

More from Ham'zzah Mir-zza

More from Ham'zzah Mir-zza (20)

Activating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license keyActivating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license key
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
Hacking tutorial.
Hacking tutorial.Hacking tutorial.
Hacking tutorial.
 
E6 logo Animation
E6 logo Animation E6 logo Animation
E6 logo Animation
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist - E6 3D Logo
Ethical Checklist - E6 3D LogoEthical Checklist - E6 3D Logo
Ethical Checklist - E6 3D Logo
 
Production
ProductionProduction
Production
 
Final schedule 1
Final schedule 1Final schedule 1
Final schedule 1
 
Final schedule
Final scheduleFinal schedule
Final schedule
 
Final production log
Final production logFinal production log
Final production log
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 
3 d animation
3 d animation3 d animation
3 d animation
 
Gd02 collaboration agreement
Gd02 collaboration agreementGd02 collaboration agreement
Gd02 collaboration agreement
 
Project Charter
Project CharterProject Charter
Project Charter
 
Gd02 ethical checklist (1)
Gd02 ethical checklist (1)Gd02 ethical checklist (1)
Gd02 ethical checklist (1)
 
Pixel and resolution
Pixel and resolutionPixel and resolution
Pixel and resolution
 
Review
ReviewReview
Review
 
Figurative artists
Figurative artistsFigurative artists
Figurative artists
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Get started with hacking

  • 1. How to get started with Penetration testing aka hacking ;)
  • 2. Hello, my name is Hamza Mirza. I’m a cybersecurity enthusiast and a python developer. In this article, I will explain where to begin with pen testing, what are the essential skills and how to approach them.
  • 3. It is not an easy task to become a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude. Though a lot of people consider that a hacker is a criminal, in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and I do not recommend you to get involved into such activities.
  • 5. Kali Linux to the rescue Using Kali Linux is probably the easiest (and the shittiest) way of hacking. If you post the question “How do I become a Hacker” in any forum on the internet, you can be absolutely certain that someone will tell you to download and install Kali Linux (formerly known as Backtrack) on your PC and then you are good to go. Kali is a Linux Distribution with a lot of tools pre-installed and pre-configured. It’s a toolbox. What you need to ask yourself is. “Would getting a brain surgeon’s toolbox make me a brain surgeon?” No it wouldn't. Similarly, Kali Linux has been written by other hackers so using the tools developed by other people makes you nothing but what’s known in the hacker world as “Script Kiddies”. These people know nothing about hacking and have little to knowledge of cyber security. So, I wouldn’t recommend using Kali Linux. In your early days it’s ok to use Kali because it gives a ‘hacker feeling’ but you shouldn’t use it in the long run. Using the tools developed by other hackers is not only not going to get you anywhere, It’s probably going to cause you problems because you really need to know how to install and configure the tools yourself to be successful in hacking. How else will you handle the moving on inside the system you have hacked when they don’t have Kali Linux in their network?
  • 6. Programming This is one of the most important skills to have in order to become a Hacker. Everything you see on your computer is already been programmed in some programming language. So, to become a Computer Hacker, you must have a deep understanding of the programming languages. Start off with Python. It’s simple, it’s easy and it’s powerful. It’s great for tasks’ automation and writing your own tools. LEARN TO PROGRAM IN C!!!! C is perhaps the most versatile programming language. If you can learn to program in C, you can learn ANY programming language in the world. All operating systems are written in C, so if you can program in C then you can easily write exploitation tools to hack into any OS. Be it Windows, Linux or Mac OS X. There are tons and tons of free C tutorials out there. I’d recommend “C programming – thenewboston” on YouTube or any of C programming courses on Udemy. However, Udemy is not entirely free, there are some free and some paid courses.
  • 7. Networking Concepts The networking concept needs to be sharp when you want to be a hacker. Understanding how the networks are created is important, however, you need to know the differences between different types are networks. Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web. Understand what is subnet, LAN, WAN and VPN. The networking commands to do a HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence, it is necessary to learn this protocol in order to break the barriers. The hackers often use the HTTP gateway to breach the security of the system and take control over it. Learn how to use all this knowledge with a programming language. All In all, you really need to have a deep understanding of TCP/IP, DNS, NAT, DNCP, Switching, Routers, Private and Public IP, Mac address, subnetting, IPv4 and IPv6.
  • 8. Learn LINUX Fuck Windows. Seriously, fuck Windows. The Windows operating system may be easy and convenient for most users, but it is certainly not suited for hackers. With the exception of few windows only tools, most hacking tools run best under Linux environment. Linux is open-source and you’re less likely to get hit with firewalls. However, I don’t recommend using Linux directly on your computer as a primary OS on your hard disk (if you want to use it for hacking). Create a Linux live bootable USB or run Linux on a Virtual Machine
  • 9. Learn Cryptography As an expert hacker, you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for internet and networking. It is the practice and study of techniques that are used for secure communication in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentication. Moreover, the technology of cryptography is extensively used in ATM cards, computer passwords and e-commerce. While hacking, these encrypted codes needs to be broken, which is called decryption. Cryptography is heavily used in SSL based internet communication. An expert hacker should be able to understand how SSL works and what is the importance of cryptography in keeping SSL secure. Try reading about various encryption algorithms and see why they are difficult to decrypt. Participate in challenges for decrypting a powerful encryption. An expert hacker will be able to demonstrate weaknesses in a encryption algorithm and should be able to write a program that can show how decryption can be performed without much information about keys.
  • 10. Staying anonymous The most important thing for a hacker is to remain “anonymous” i.e when you will do any illegal activities or even any ethical stuff you won’t be caught by cops. Use a VPN or a proxy. A VPN like hides your IP by connecting you to another server, a proxy actually does the same! You only have to use a VPN or Proxy when you’re doing your activities, after them, you turn it off. Let me explain it a bit. People will do everything to find you, so even a little mistake can lead you to cops or you can be found! You have to put people on a dead track. Whenever planning to do some hacking stuff you start your PC on with a proxy, and then do you work and then turn off the proxy after completing the work and don’t use the internet for 20-30 mins after that, you start it up without any proxy, and do your legal normal things.