Steps to start hacking for beginners.......
Where and how and what to do first, so confusing for beginners????? so let's begin
How to start your hacking:
1.Learn some basics of Computer.
2.Read some starting guides.
3.Search for new things on google.
4.Learn from others(it is more important.)
5.Watch some practical videos.
Ok, now you have to know about the requirements.
2.What are the requirements of hacking??:-
A)Computer or laptop if not rooted mobile if that also Don't have you can use non-rooted mobile also but you can able to only a few things.
(B)Which things do we have to do in pc or phone🙄 to install the software or apps.
In pc:- Install kali-Linux or parrot os which you like and learn deeply about that virtualization and Linux cmd's(commands) you should have fast internet to make work fast while installing tools mainly.
(c)How to install git links:-
Git links you can find paid tools in google free tools are available in GitHub we will make a blog on that to make things easier for all 😉 don't worry about the installation process we will make things easier and smart.
After environment setup(don't worry it is just the name for installation setup😅😅) you have to know about hacking phases🤔
(we will post about termux soon)
Hacking phases are:-
1Reconnaissance:
This is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups,
Network
Host
People involved
There are two types of Footprinting:-
Active: Directly interacting with the target to gather information about the target. Eg Using the Nmap tool to scan the target
Passive: Trying to collect the information about the target without directly accessing the target. This involves collecting information from social media, public websites etc.
2.Scanning:
Three types of scanning are involved:
Port scanning: This phase involves scanning the target for information like open ports, Live systems, various services running on the host.
Vulnerability Scanning: Checking the target for weaknesses or vulnerabilities which can be exploited. Usually done with help of automated tools
Network Mapping: Finding the topology of network, routers, firewalls servers if any, and host information and drawing a network diagram with the available information. This map may serve as a valuable piece of information throughout the haking process.
3.Gaining Access:
This phase is where an attacker breaks into the system/network using various tools or methods. After entering into a system, he has to increase his privilege to administrator level so he can install an application he needs or modify data or hide data.
4.Maintaining Access:
Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits, or other malicious files. The aim is to maintain access to the target until he finishes the tasks he planned to accomplish in that target.
5.Clearing Track:
No thief wants to get caught. An intelligent hacker always clears all evidence so that later at some point in time, no one will find any traces leading to him. This involves modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling all applications he used, and deleting all folders he created.
Bonus tip:-best information-gathering tool is maltego and it is paid and also has a free version and also information gathering git links available on google😊.
(We will post about information gathering in ethical hacking and many tools stay tuned.)
All the information is only for educational purpose don't do any illegal things we are not responsible for anything🤗
Comment your doubts and keep sharing and reading.
and comment below what do u want us to post
Thank you for reading our blog...
credits:- spidy boy, dark rider
1 Comments
🤟🤟🤟
ReplyDelete